Download Impact of Dual-Use Goods and Technology - Econ

Document related concepts

Production for use wikipedia , lookup

Balance of trade wikipedia , lookup

Economics of fascism wikipedia , lookup

Post–World War II economic expansion wikipedia , lookup

Đổi Mới wikipedia , lookup

Chinese economic reform wikipedia , lookup

Protectionism wikipedia , lookup

Transcript
IMPACT OF DUAL-USE GOODS AND TECHNOLOGY
TRANSFERS ON NATIONAL SECURITY
A Thesis Submitted to
The Graduate School of International Studies
University of Denver
In Candidacy for the Degree of
Master of Arts
Brian Allen Hunt
April, 2000
TABLE OF CONTENTS
INTRODUCTION.................................................................................................................. 4
The Marriage of Economics and National Security............................................................ 5
1.0 Ideology and The Nature of the Political Economy ................................................. 7
1.1 Evolution of the International Market Economy ................................................... 7
1.2 Monetization of Economies: Implications for New Relations and Security ........... 9
1.3 The Age of Mercantilism ....................................................................................11
1.4 Liberalism out of Mercantilism............................................................................14
1.5 Criticism of Liberalism in a National Security Context ........................................15
1.6 Defense Industries in a Liberal Environment ......................................................16
1.7 Marxism: An Alternative Paradigm to Mercantilism and Liberalism ....................18
1.8 Marxism and Security ........................................................................................19
1.9 Which Theory Provides the Best Road Map? .....................................................19
2.1 Overview: Complex Relationships between Nation-States and Transnationals ..20
2.2 The Transnational vs. the “Competitive” Nation-state ........................................24
2.3 The Operations of Transnationals in an Anarchic System ..................................25
2.4 Increasing Military Capabilities through International Transactions in an
Interdependent Environment ..............................................................................30
2.5 Measuring Increased Military Potential from International Transactions .............31
2.6 Externalities in Trade and a Country’s Military Capabilities ................................34
2.7 “Dual-use” Technology Transfers and its Problems ...........................................35
2.8 Closing the Technology Gap: Large Country vs. Small Country .........................37
3.0 National Security and Technology Transfer: Strategic Dimension of East-West
Trade in the Cold War ...........................................................................................39
3.1 The Dynamic Benefits of East-West Trade to Soviet Economic/Military
Capabilities ........................................................................................................42
4.0 Export Controls, China & Hughes Electronics Corporation—National Security
Compromised? ......................................................................................................44
4.1 The Disutilty of the Current Export Control Regime............................................44
4.2 Assessment of the critical issues surrounding export controls............................47
4.3 The Futility of a Multilateral Export Control Regime ...........................................52
4.4 China and Hughes Electronics Corporation: National Security Compromised? ..54
4.5 Why “Dual-use” Transfers to China are Risky ....................................................55
4.6 A Look at China’s Defense Infrastructure ...........................................................59
4.7 China’s Ability to Assimilate Foreign Technology ...............................................61
4.8 China and Hughes Electronics Corporation .......................................................64
CONCLUSION: Containing Tech Transfers with out Compromising Economic Security ......67
REFERENCES....................................................................................................................72
INTRODUCTION
The end of the Cold War gave fresh impetus to reexamining the unique balance
between economic interests and national security interests of the nation-state. Today this
interrelationship of economic and national security interests is becoming dangerously
unbalanced in today’s international trade environment. Writing in a 1998 article, Michael
Hirsch pointed out the notion that every time a country engages in a commercial transaction,
a little bit of national security is traded off (p.3). This harks back to a time when the CIA
began counters worried over every uptick in Soviet technology, and when the U.S. defense
industry was sequestered by Pentagon top brass to spend billions and build new weapons.
Even for all its peril, the Cold War was in some ways a reassuring time. The enemy
and the choices faced by the United States were clear. Now, politicians argue that national
security is being “sacrificed at the altar of commerce” (Hirsch, p.2). Writing in 1941, Edward
Mead Earle argued that “in modern times…we have constantly been confronted with the
interrelation of commercial, financial, and industrial strength on the one hand, and political
and military strength on the other. This relationship is one of the most critical and absorbing
problems of statesmanship” (Kapstein, p.xiii).
This problem has gained new currency in light of recent proliferation issues
connected to commercial transactions in “dual-use” technology. On May 11, 1998, India
exploded several nuclear devices to be followed a few weeks later by Pakistan. Then came
the shocking allegations that two U.S. satellite companies, Loral Space & Communications
and Hughes Electronics, had violated U.S. export controls by helping Beijing improve its
missile guidance systems and the accuracy of its intercontinental ballistic missiles targeted
at the United States. In regards to Loral and Hughes’ recent satellite technology transferring
scheme to China, Republicans and Democrats view this form of commercial transaction with
China as compromising national security for the sake of profits and market share. This case
— 4—
(the Hughes Electronics case which will be looked at later) is a clear illustration of the
complex relationship between commerce and national security that has been exacerbated
by the deepening integration of the U.S. in the world economy.
The Marriage of Economics and National Security
Since the inter-war period it has been clear that the intersections of economics and
national security of a nation-state in a global economy are highly complex. Included in these
intersections of interests would be the following: rationalizing the impact of defense
spending on various sectors of the economy and employment, implications of
interdependence and globalization for economics and defense, weapons production and
procurement issues, defense mobilization, ensuring a defense industrial base with surge
capacity, exploiting “dual-use” technologies, joint research and development with allies and
past adversaries, defense burden sharing among allies, energy and raw material defense,
and acquisitions by foreigners of U.S. corporations that have defense business (Jordan,
p.292).
These intersections between economics and security become more apparent as the
operations
of
the
national
economies
interdependent in international trade.
become
more
complex
and
increasingly
Take for example the next generation of fighter
aircraft. The plane maybe designed in the United States, but the fuselage maybe made in
Britain and the computer components for radar made be made in Italy (Markusen, p.40).
But it does not stop there. Once the plane is in production, its assembly could be in South
America, Korea, Turkey, or the United States, as the F-16 is today, “with unique high tech
components from Germany, Israel, Japan and Russia and more cost-sensitive and
commercially available components from Brazil, South Africa, and Spain” (p.40).
The complexity of the integration of the U.S. into the world economy can be seen in
trade statistics as well. In 1996, 19% of U.S. Gross National Product (GNP) was exported
— 5—
and imported. Exports alone totaled about $615 billion. In Europe the numbers are higher:
22% for the United Kingdom and 31% for Germany (Jordan, p.292). The extent of this
interdependence was noticed first in 1986 when global trade topped the $4 trillion marked,
reached $6 trillion in 1989 and soared to $10 trillion in 1998 (Jordan, p.292).
In today’s global economy where trade policies have made nation-states more
competitive than ever for export markets, supply sources, capital, labor, and technology, the
behavior of transnational corporations is held loosely in check and defense experts argue
that national security interests have been compromised by this behavior. The nation-state’s
last protectionist tool of security---export controls---has been loosened to such a degree that
transnational corporations can act beyond the “arms length of the nation-state”, and
exchange “dual-use” goods (i.e. semiconductors, global positioning systems, etc), which
have a military application.
It is the purpose of this paper to examine how international trade and global
competitiveness has helped increase the influence of economic concerns at the expense of
military security. The claim is that in a post-Cold War era with declining defense spending,
U.S. defense industries that have become “civilian” have moved outside their home market
to meet the procurement demands of other national economies.
The result of these
commercial transactions in “duel-use” goods and weapons technology is the potential
increase in a trading partner’s productive and military capabilities that may erode future
relative gains in security for the U.S.
To examine this issue, part one of this paper will discuss from a historical
perspective the evolution of an interdependent market economy that has renewed the
debate of national security vs. free trade. Now the historical record itself is being
reexamined more for the insights it can provide regarding the nature, causes, and
consequences of economic interdependence. It is important to understand the structure of
— 6—
the environment in order to understand the behavior of the actors. Part two will look at the
specific possible interaction between international trade and a potential adversary’s military
strength. Important here is the welfare affect and technology diffusion gained by a state in
free trade that affects the country’ s economic and military development. Part three will
shed more light on this issue by examining trade and other economic issues of the Cold War
that affected different foreign policy and military outcomes. And finally, part four will discuss
the current investigation of Hughes Electronics Corporation’s China commercial satellite
transfer scheme, and the present export control regime that has strengthened economic
nationalism over liberalism. In this paper the terms nation-state and country will be used
interchangeably.
1.0 Ideology and The Nature of the Political Economy
1.1 Evolution of the International Market Economy
Political scientists of the realist school of thought, characterize the international
system as one of anarchy, by which there is an absence of central authority to hold the
behavior of sovereign states in check. Within this anarchic world, states must pursue the
twin goals of security and prosperity. Friedrich List defined this relationship well when he
argued that “national wealth is increased and secured by national power, as national power
is increased and secured by national wealth” (Kapstein, p.1)
Even if the pursuit of national wealth is part of a competition for power, doing so may
well require some degree of economic cooperation with other nation states. Robert Gilpin
argues that the consequence of this economic cooperation is one of the most distinctive
features of modern history, namely the emergence of a market economy for organizing
economic relations (Gilpin, p.20, 1977).
— 7—
The market economy, with it roots in seventeenth and eighteenth century Europe,
involves a place where goods and services are exchanged to increase the potential return to
the buyers and sellers. The outcome of the exchange itself is determined by the laws of
economics (supply and demand) and constitutes more or less its own autonomous sphere of
influence.
From its appearance, one may argue that a market economy being its own sphere
of influence divorces itself from the security needs of the state. However, the opposite is
true. The efficiency of the market system actually weds security with commerce as nation
states pursue wealth and power through interaction and cooperation with other nation
states. Yet, it is important to note here the drive for economic efficiency can act as a double
edge sword and compromise a nation state’s security. An example of this analogy would a
case in which the gains from commerce are not reflected in improved productivity or passed
along to make new improvements in the nation-state’s military and weapons. The balance
between commerce and defense is delicate and can become unbalanced if not prioritized
properly.
Theories on the balance between economic prowess and military strength date back
to Adam Smith’s Wealth of Nations. “Adam Smith---the first great theorist and proponent of
the market exchange system---recognized defense to be ‘of much more importance than
opulence’” (Gilpin, p.22, 1977).
The rationale for a market system is that it creates
economic efficiency and maximizes economic growth” (Gilpin, p.22, 1977). The objective of
economic activity is not to enhance security but enhance the powers of the consumer.
Defense was viewed as a public good and the responsibility of government and should not
be maintained by market forces. As such, Smith, liberals, and other neoclassicists tend to
de-emphasize the security and costs of a market economic system. Economic interaction is
viewed as a force for peace, however the costs of increasing this interdependence tends to
— 8—
disrupt societies core values and increase its vulnerabilities and sensitivities to outside
influences (Gilpin, p.22, 1977). For this system to work well hegemony and efficiency are
necessary.
This goes back to the statement made earlier that economic efficiency and security
must be balanced. In an anarchic system, without checks and balances between sovereign
entities, a hegemonic nation-state can offer the balance needed between the market system
its guides and the security interests of the actors involved. In this case, economic efficiency
provides mutual gains in security to all actors in a given system.
According to Gilpin,
hegemony without efficiency tends towards mobilized economies, thereby increasing
conflict. And efficiency without hegemony creates the free-rider problem in which other
societies take the gains of commercial interaction but not the costs.
Gilpin’s statement may sound confusing, but it points to the danger of how relative
gains in commerce upset balance-of-power arrangements in an anarchic system. This may
help to explain why under the Pax Americana era other economies were able to flourish
under an umbrella of U.S. security making it the longest peace maintained (with the
exceptions of localized military conflicts) in the post-World War II era.
1.2 Monetization of Economies: Implications for New Relations and Security
The Age of Exploration and the increased interaction between nation-states in the
“new economy” that came with it necessitated the monetization of the economy.
The
monetization of the economy has been a necessary precondition for the establishment of
efficient markets
The most obvious implication of a monetized economy is that it greatly extends the
geographical scope of the market, the range of goods and services provided, and creates
more efficiency (Gilpin, p.23, 1977).
Because of its efficiency, the market’s dynamic
— 9—
qualities attract an increasing number of buyers and sellers into its web of relations. The
motivation of the entrants is the desire to accumulate money, which can eventually be
exchanged for an even wider range of goods and services. Because of money’s efficiency,
other primitive forms of exchange (i.e. barter) are driven out and new relationships between
buyers and sellers are drawn in (Gilpin, p.23, 1977).
With the increasing number of entrants, new far-reaching implications for security
develop out of the new relationships between buyers and sellers. The advent of money
tends to dissolve traditional social relations and core values once protected by more
primitive forms of exchange. Max Weber argues that due to the lack of an adequate money
supply in European feudalism, the monetization of the economy led to its demise. Once
money is introduced into a society, there is the encouragement to accumulate wealth and
power domestically and internationally. This monetization of the market economy results in
the transformation of relations among groups and states.
This growth of the money supply from international trade between territories brought
about far reaching political and military implications. Monetization made possible the Military
Revolution in seventeenth century Europe (Gilpin, p.23, 1977). This period in history refers
to the rise of standing armies and their supporting national bureaucracies, all requiring large
amounts of money to finance its development. “The nature of war was transformed from a
clash of societies into an instrument of the national policies of emerging states” (Gilpin, p.23,
1977). National interests were defined as the protection of markets and the supply flows of
natural resources for the beginning developments of the modern military industrial complex.
As seen, the importance of money to states brought security and economics hand in hand.
A second important feature of the market economy was the rise of a middle class.
The ease with which this class achieved ascendancy in domestic and international society is
extraordinary. A key to the development of the middle class was the so-called
— 10—
Mediterranean commercial highway that passed through different cultural groups owning
different modes of production capabilities. This system encouraged the rise of commercial
centers in which the middle class had a high degree of independence and political influence.
Upon this base, money and trade became important for the financing of militaries to protect
territories and commercial centers.
“Although this alliance was rife with tension, the
recognition of middle class property rights were critical in the evolution of the nation-state
and mercantilist empires of the seventeenth and eighteenth centuries” (Gilpin, p.25, 1977).
These mercantilist empires constituted the developing interdependence of a market
economy on a global scale.
1.3 The Age of Mercantilism
Mercantilism, the economic doctrine most closely associated with defense
economics, dominated international thought in political economy during the seventeenth and
eighteenth centuries.
It was a system of power politics achieved by economic means.
Mercantilism was the first attempt to create an organized international market economy in an
anarchic system. Under mercantilism the economy was partially subordinate to the security
needs of the state. In an anarchic system a nation's military power was critical and could
only be maintained and financed by wealth and capital accumulation from international
exchange.
Since wealth and power went hand in hand, mercantilists perceived that the
accumulation of gold from abroad would be needed to finance future warfare. To achieve a
more than adequate flow of gold into the country’s coffers, mercantilists agreed that
balance-of-trade surpluses needed to be run. Thus by increasing trade, countries could
increase their wealth and consequently their security. For this extension of security to be
achieved countries would have to expand their economies through the expansion of their
territorial base in order to integrate new markets (Gilpin, p.32, 1987).
— 11—
An observation on the security of the state and need for overseas markets was best
expressed by Alexander Hamilton in his Report on Manufactures presented to the U.S.
Congress in 1791. Hamilton argued that “not only wealth but the independence and security
of a country appears to be materially connected with the prosperity of manufactures”
(Kapstein, p.2). Hamilton also argued that many of the “embarrassments” suffered by the
colonies in their struggles with England were due to their dependence on foreign suppliers
for defense material (Kapstein, p.2). This was the essence of mercantilism: survival in an
anarchic system in which the actors are faced with a “zero-sum” game and have to look to
themselves for their own survival. The “zero-sum” game is crucial in realist theory and
mercantilism. In the international economy, states jockey with one another to enhance their
relative prosperity that can one day be transformed into military power. As these states
enter into agreements with other states, they must concern themselves with the problem of
another state’s relative gains.
Even among allies in an anarchic environment, consideration of relative gains in
nation-state interactions never disappears, because the possibility of armed conflict between
allies never disappears (Mastanduno, p. 80). In a mercantilist/neo-mercantilist world, nationstates must calculate those allies today maybe adversaries tomorrow or in the next decade.
Therefore, hegemony is necessary in mercantilism to ensure that economic interactions do
not disproportionately benefit allies.
Even if the chances of armed conflict are remote, nation-states worry about the affect
economic interaction has on their political autonomy. A nation-state acquiring more of the
benefit from an economic transaction with its partners, may develop asymmetrical
interdependent relationships with them, which may result in political vulnerability, constraints
in decision-making, and even leverage over the behavior of their trading partners
(Mastanduno, p.80).
— 12—
Going
beyond
behavioral
affects,
nation-states
are
concerned about
the
consequences of their economic activities. This is to the extent that mutually beneficial
transactions may put a trading-partner’s firms at a competitive disadvantage leading to the
reduction in productive capacity of their industrial base, or far worse the movement of highvalue added activity away from a home territory (Mastanduno, p.80). This has become a
critical issue in defense economics as private defense firms relocate R&D and other
production operations abroad to improve their own competitive advantage. In an anarchic
environment nation-states are expected to pursue relative gains to keep allies and
adversaries in check, and forgo the benefits of cooperation and economic exchange in the
short-run, in order to have security in the long-run (Mastanduno, p.81).
In international trade, the liberal principles of comparative advantage do not just
occur through the market’s “invisible hand”. Relative gains become distributed unevenly.
Instead economic openness (a critical component of a market economy) is needed and only
arises in the presence of a hegemonic power. “In short, the theory of hegemonic stability
rests on two fundamental propositions: (1) order in world politics, created by one single
dominant power, and (2) the maintenance of order required by the continuance of
hegemony” (Kapstein, p.3). Through order in relations guided by a hegemon, the system
becomes less of a “zero-sum” game and more of a “positive-sum” game.
Scholars of hegemonic stability cite two examples in support of this proposition: the
Pax Britannica, which endured from the end of the Napoleonic Wars until 1914, and the Pax
Americana, which emerged in 1945. During both periods, international economic relations
were arguably a “positive-sum” game. The world economy was afforded protection by the
hegemon from all challengers. In this scenario, the ideals of liberalism were allowed to
flourish in trade and investment.
Over time however hegemons lose power.
This is
because other actors are “flourishing” at the expense of the hegemonic power (i.e. the free-
— 13—
rider problem). As a result, states begin to defect from the hegemonic system and system
fragmentation occurs. Conflict and war follow may soon follow.
To avoid this outcome, political realists/mercantilists see a powerful role for the state
in both national and international economies. Partial subordination of the economy to the
interests of the state is needed in order to achieve autonomy and superiority in defense.
Moreover, it is necessary in the international economy for the hegemon to maintain
cooperative commercial relations.
“In the absence of a hegemon, the realist sees the
distribution of economic gains no less than military powers as a “zero-sum” game”
(Kapstein, p.5).
1.4 Liberalism out of Mercantilism
Under the hegemony of Great Britain during the industrial revolution, a new type of
international economy was being organized, one that was based on specialization, free
trade, and an international division of labor. This new organization the economy became
known as liberalism.
Liberalism was no less concerned about the security of the state, but espoused a
hands off approach between bureaucracy and the market, and the international division of
labor was the most efficient means of creating prosperity, efficiency, and security (Kapstein,
p.5). The thinking of liberals was that as the state increased its prosperity domestically, the
burden of defense would weigh less on economic activity. Overall, economics was central
to military might.
Under liberalism it was hoped that as commercial and financial flows became more
global, economic incentives to engage in hostilities would be reduced, paving the way for a
peaceful world order. As Adam Smith states in his Wealth of Nations, trade would be a
peace-promoting device of statecraft.
Jean Jaques Rousseau put the argument for
— 14—
liberalism well when he said that economic interdependence creates bonds of mutual
interest and restraint which has an influence upon the struggle for power and advantage
among nation-states (Gilpin, p.30, 1977). Liberalism then offered a powerful alternative to
mercantilism as a way of achieving the nation-state’s most prominent goals: wealth and
security.
1.5 Criticism of Liberalism in a National Security Context
An important criticism of liberalism in a national security context was the possibility of
market failure. Adam Smith recognized the possibility of market failure, that is the market
could not provide the adequate resources for the preservation of national security. His
argument was that national security was not a product of economic activity and fell outside
the laissez-fair doctrine as a “public good”, a good that would not be provided by a
commercial sector. National defense thus fell upon the responsibility of the government
(Kapstein, p.5).
Mercantilists recognized this important insight into liberalism. For the mercantilist,
the preeminent problem facing every state in an anarchic society was security; political and
economic liberties were of secondary concern. Liberalism was a radical departure from
mercantilism since it viewed the relations in the international system as a “positive-sum”
game. Yet the necessary precondition for this envisioned environment was order by a
hegemonic power that provided the security to the international system so relations between
states would a “positive-sum” game.
Another important criticism of liberalism was the unequal distribution of relative gains
between countries as they interacted with one another in commerce. The gains from trade
in a liberal system were unequally distributed among the actors, which depended on the
relative size of a nation-state’s economy and its productive capacity.
This is because
factor-endowments of nation-states (land, labor, and capital) are proportioned unevenly
— 15—
regardless of product specialization, and technology levels of a country are more of an
endogenous variable than an exogenous variable. The security concern recognized in this
by economic nationalists/mercantilists was that industries had spill over affects
(externalities) throughout the economy brought on by the international division of labor and
other productive functions and would eventually lead to an increase in welfare of other
economies. This is well illustrated in trade between a large country (capital intensive) and
small country (labor intensive). In this case, the terms of trade are tilted more in favor of the
small country, which gains at the expense of the large country.
This is achieved by
importing capital intensive goods that can be used to improve in the long run the productive
efficiency of its economy relative to the large country’s economy. Therefore in mercantilist
thinking, “industry is prized” and should be protected “because it is the basis of military
power and central to national security in the modern world” (Gilpin, p.33, 1987).
1.6 Defense Industries in a Liberal Environment
With these concerns it is important here to briefly discuss the degree to which
liberalism has imbedded itself in today’s modern defense economy. Defense industries
since the 1980s have become increasingly global in the scope of their operations in order to
take advantage of the factor-endowments of another nation-state in order to make the
industry’s production more efficient or cost affective. Today, “foreign-sourcing of militaryrelated components has become widespread, while more military (and commercial) research
which is ‘“dual-use”’ in character, meaning that civil and military technologies is rapidly
becoming indistinguishable” (Kapstein, p.7).
According to Michael Hirsch, this indistinguishability between civil and military
technologies is the result of defense industries becoming more civilized against the
backdrop of reduced government spending on defense (p.3).
defense
technology-like
naval
propulsion,
— 16—
electronics,
Today much of the best
and
command-and-control
telecommunications are coming from the commercial sector. “Dual-use has become the
standard and not the exception. It just so happens that the defense industry is reconstituting
itself into a commercial oriented business that has defense customers outside its home
market. Part of America’s defense edge is dependent on its own commercial prowess,
which in turn depends on exports and a global leadership role.
In this case, banning
companies like Loral and Hughes from conducting satellite sales in China would probably
harm national security more than letting prize technology fall into the hands of military endusers in Beijing (Hirsch, p.3). However, this assumption is dangerous since it is assumed
that China does not have the capability to integrate such technology into its militaryindustrial base. In this case liberalism downplays the opportunity cost to defense in such
“dual-use” goods transactions.
Liberalism’s response to this attack is that economic nationalism/mercantilism create
conflictual, asymmetrical relationships between the capital-intensive countries in the center
of the system and the weaker labor-intensive countries on the periphery. Mercantilism itself
eventually led to interdependence through nation-states’ quests for new sources of raw
materials needed for state security.
Adam Smith pointed out that a liberal international economy could not develop
without the support of dominant economic states at the center (Gilpin, p.34, 1987). One
cannot happen without the other. Indeed one may argue that the international system is a
mixture of economic nationalism/mercantilism and liberalism. Which side of the spectrum
the system will fall to will depend upon how the present state system develops in the future.
Interdependence is simply a product of both. Which is given more weight (economics or
security) will determine which ideology will dominate.
— 17—
1.7 Marxism: An Alternative Paradigm to Mercantilism and Liberalism
With the end of the collapse of communism after the Cold War, it is tempting to argue
that Marxist/Leninism is only of historical interest. However it still provides a useful function
of explaining defense expenditure domestically and the global pursuit of wealth and power
internationally at a systems level.
Although the founders of Marxist thought—Karl Marx and Friedrich Engels—wrote
very little on international economics, they fully appreciated the political implications of the
development of an interdependent world economy. Contrary to liberal thought, which holds
interdependence as a means of peaceful relations, Marxism regarded it as a prelude to
world revolution.
For Marx and Engels the rise and spread of an interdependent world economy was
progressive and a step forward for humanity (Gilpin, p.43, 1977).
Capitalism was a
precondition for drawing the world into the market economy and setting the stage of a
proletarian revolution. Marx believed that the causes of underdevelopment of the states in
the periphery were from problems inherent in those societies, and western imperialism was
necessary to smash social and cultural conditions inhibiting economic development (Gilpin,
p.44, 1977).
The aftermath is a dominant capitalist world economy planting its own seeds of
destruction in that it diffuses technology and industry, and thereby undermines its own
position. As a result, peripheral states would develop their economies from this diffusion of
technology. “The intensification of the economic competition between the declining and
rising capitalist powers leads to economic conflicts and imperial rivalries” (Gilpin, p.45,
1977). Like the mercantilists, Marxism viewed the world system as also a “zero-sum” game.
— 18—
1.8 Marxism and Security
In terms of security issues, Marxists and Communists are violent revolutionaries
whom view the aggressive and imperialist nature of capitalism as the root cause of
insecurity in an interdependent world market. According to Marx, militarism is imbedded in
the nature of capitalism. “Capitalism pursues an internationally expansive logic as industrial
states accumulate surplus production, which is always more than what the ‘exploited’ worker
is able to buy. According to the Marxist accounts of history, by the late 1800s the growing
crisis caused by economic surplus led to intense competition among industrial states for
unexploited markets overseas” (Kapstein, p.8). This nature of capitalism is suspected to
have disrupted the balance of power system of the early twentieth century.
This suggests that Marxism view militarism and defense expenditure as inherent in
capitalist economies to thwart off the foreign competitors in the market periphery. As a
result economic relations among states become competitive (i.e. an arms race), conflictual,
exploitive, and “zero-sum”. Unlike like liberalism which views interdependence as a means
of peace among actors to restrain hostilities, Marxism sees it as a needed conflictual
arrangement that will in the end destroy itself and lead to the evolution of a “workers
paradise”.
1.9 Which Theory Provides the Best Road Map?
Among these ideologies the question before the policymakers is which one provides
the best road map to achieve a balance between economic efficiency and national security.
With the collapse of Communism, the two theories left to debate are economic nationalism
vs. economic liberalism.
Critics of liberalism argue that the market cannot ensure the military goals of
autonomy and superiority. It is an inherent fact that under comparative advantage (which
provides the market its efficiency) states must accept the conditions of dependence on
— 19—
foreign economies if they want a wider range of goods and services (Kapstein, p.10).
Although there is much truth in the economic nationalist/mercantilist/neo-mercantilist
perceptions, the problems of foreign dependence in liberalism may be alleviated by
searching for substitutes for defense related goods in the home market.
However, liberals do agree with neo-mercantilists that state intervention is necessary
to provide security. At the world market level, liberals see a hegemon as necessary to
provide collective security and economic stability so wealth and prosperity can flourish under
a liberal system.
This is so not to have a profound affect on a country’s defense
expenditures since the actor is improving its efficiency and power under the umbrella of
security provided by the hegemon.
The implication of these two views is that when confronted with a national security
issue, the policy maker should maybe first explore a liberal solution so as not further disrupt
the markets efficiency and the collective security of individuals.
“The official should
recognize that even within the defense economy, the principles of competition,
entrepreneurship, and free trade have a prominent place” (Kapstein, p.10). But as Adam
Smith argued, “defense is more important than opulence”. Unfortunately the marketplace
can not always be relied upon when it comes to the defense of the economy.
2.0 Behavior in the International Market and National Security
2.1 Overview: Complex Relationships between Nation-States and Transnationals
The interdependence between nation-states created by international trade produces
a complex array of linkages between national security and international relations. Trade
flows reflect the pursuit of domestic interests and goals interacting in a global environment
characterized by different levels of power and capabilities. For instance, U.S. support of
European integration and its willingness to withstand trade discrimination vis-à-vis Europe
— 20—
and Japan derived in large part from security concerns within the Cold War context (Meltzer,
p.200).
In a basic sense, gaining and preserving security hinges upon national power
capabilities, to achieve essential values. Stanley Hoffman noted:
“Today interdependence breaks all national eggs (power capabilities) into a
vast omelet. I don’t know where my power ends and yours begins, since my
power is partly your hostage and vice versa, and the more I try to force you to
depend on me the more I depend on you” (Meltzer, p.202).
What has created this “vast omelet” of interdependent power capabilities are the
structural changes in production patterns and exchange happening in today’s marketplace.
These changes include the rapid diffusion of technology and information, the increased
mobility of transnational corporations, and shortened time lags in cyclical trends and
production cycles among trading nations. Underlying these changes is the fundamental
dilemma facing every national government: the painful trade off between enjoying the
economic gains from involvement in international economic relations and preserving
national autonomy, security, and self-direction without disruptive external impacts (Meltzer,
p.207). Western nations are exporting ever-larger proportions of their GNP. New products
are emerging whose inputs may cross national borders through intra-firm trade numerous
times during the production process. And, production strategies today are shifting research,
development, and manufacturing processes around the world (National Academy of
Sciences, p.55). As a result the U.S. economy is very sensitive to policies that affect its
trade and changes in the market that create more vulnerabilities for it as it deepens its
integration into the world economy.
Of these changes, information diffusion and multi-market production strategies are
the most critical facets of today’s global economy that has deepened the integration of the
nation-state into the world economy.
It is the way that transnational corporations take
— 21—
advantage of these changes that has threatened U.S. hegemony in the world economy by
increasing vulnerabilities in security relationships making them more complex in an anarchic
system. These vulnerabilities in the international system create incentives for companies to
pursue such global production strategies as locating research, development, and
manufacturing facilities around the world as well as to enter joint ventures with foreign
companies.
The shift to global production has increased the roster size of companies
capable of producing high-technology products, with many of the emerging companies
coming up in the new industrialized economies of Southeast Asia (National Academy of
Science, p.55).
For instance, some of the top-line U.S. supercomputers of particular
importance to the country’s intelligence community are made in East Asia!
As can be
imagined, this situation has become a rising source of contention among U.S. defense
planners.
The increased availability of these products and the rapid diffusion of technology
make the effort to control the proliferation of sensitive technologies more difficult. One by
one, commercial uses are being found for military technology. For example, night vision
goggles, an important piece of military equipment covered under the munitions list at the
State Department, can now be found in the L.L. Bean catalog (Hirsch, p.6). GPS receivers,
once intended for guiding ballistic missiles, are now in reach of every backpacker and car
owner on the planet (p.6). The question is why the availability now? What has happened?
Recent administrations saw that in order for U.S. companies to be competitive abroad
export controls on high-tech goods needed to be relaxed.
The danger of this is the
increased level of trade with the transitional economies of China, Eastern Europe, and the
former Soviet Union, that want these products and the end user is not always known.
The above is a growing concern surrounding the intersection of the international
market place and security in the expanding commercial market for “dual-use” products, most
— 22—
of which embody advanced technology.
To compete successfully in this market and
maintain market share, U.S. firms are experiencing added pressures to export their most
technologically sensitive products (National Academy of Science, p.56). By the late 1970s
there were a number of “dual-use” technologies, such as advanced microelectronics,
introduced into the marketplace before they were found to have military applications
(National Academy of Science, p.56). The assumption is that if your economy is running
faster than the next one, then being ahead a few product life-cycles would more than
compensate any trade off with security that is attached to a “dual-use” transaction (Hirsch,
p.8)
Yet, trade in “dual-use” goods cannot take all the blame. New global production
processes alone are not creating security concerns so much as the increased reliance of the
U.S. on the world economy. The oil crisis of the 1970’s is a good illustration of how reliance
of nation-states in regard to access to critical natural resources opens more vulnerability.
The U.S. is the world’s largest importer of goods and services that make the country very
sensitive to changing trade policies of other nation-states.
The degree of increased
sensitivity correlates with the amount of overall trade the U.S. has with its trading partner.
For instance, a change in trade policy by Japan would have a higher degree of
sensitivity to aggregate U.S. economic concerns than a change in trade policy with say any
of the member states of Africa. As well, this degree of sensitivity varies from country to
country the U.S. trades with depending on the portfolio of imports and exports the U.S. has
with that country. Presently, we can see this sensitivity in the high price of oil imports from
OPEC nations. Complicating this issue of sensitivity are transnationals and their behavior in
regards to export controls of their home country. Many economists view the U.S. as
discouraging to exporting companies who have moved their production processes closer to
their target markets.
The relationship between transnationals and the nation-state is a
— 23—
critical issue when looking at the vulnerabilities created by deepened integration in the world
economy.
In a growing free trade environment along with the development of regional trading
blocs and other unions between nation-states, effective managed trade to supervise security
concerns has diminished. The nation-state is treated as a rational actor in an economic
system that seeks to maximize economic gains. Acting as a rational actor some political
analysts see the nation-state as retreating from its autonomy in order to pursue
expansionary policies to acquire new market share for its transnationals. This vulnerability
has been taken advantage of by transnational firms, which can operate beyond the control
of U.S. borders.
The transnational firm itself is viewed by many defense planners as generating new
vulnerabilities in international trade. Even being ahead a product life cycle or two just won’t
cut it. If so, one may argue that regulation of the transnationals’ behavior is needed for a
retrenchment of the nation-state
2.2 The Transnational vs. the “Competitive” Nation-state
At one time the governance of the international economy was synonymous with
government by nation-states as control was exerted over its sovereign territories.
Historically the state was the primary regulator of its national economic system (Dickens,
p.79).
Trade and investment in the world economy were literally “inter-national”. However
with the increased permeability of the nation-state to ebbs and flows in the world economy,
the state as a container is no longer.
As technology advances and information becomes more diffuse, nation-states as
containers are “leaking”. This is because today the nation-state has moved away from the
role as a regulator to a role as a competitor—behaving like firms—in the international
— 24—
economy.
According to Dickens, in an interdependent global economy, nations are
behaving like firms and compete with one another to attain economic goals and interests. In
a sense, states acting like firms have taken on roles as “competitive states”.
Dickens looks at Krugman’s work to point out that this shift in role to a “competitive
state” is dangerous and can help to explain the conflictual relationship between the
transnational and the nation-state. The concept of a competitive state according to Krugman
is elusive because nation-states are not like corporations (Dickens, p.87). Dickens quotes
Gordon on the conflictual relationship between transnationals and the nation-state:
“It is perhaps most useful…to view the relationship between transnationals
and governments as both cooperative and competing, both supportive and
conflictual. They operate in a fully dialectical relationship, locked into unified
but contradictory roles and positions, neither the one nor the other partner
clearly or completely able to dominate” (Dickens, p.243)
This quotation captures the essence of this conflictual relationship and when the
nation-state is viewed as a competitive body, this statement makes sense. Nation-states
would prefer that transnationals hold their allegiance to their home market. However, this is
not the case since transnationals not only span national boundaries but also incorporate
parts of other economies within their boundaries (Dickens, p.243). This relationship is a
major problem for states. The other problem is the rules by which transnationals operate.
2.3 The Operations of Transnationals in an Anarchic System
Transnationals pursue global strategies that offer the highest rate of return.
As
mentioned previously these include relocating research, development, and manufacturing
operations globally to minimize cost, maximize efficiency, and have closer proximity to their
target markets. Given the increasing complexity of technology and rising R&D costs, more
firms are globalizing their production processes. The cause for this is the increasing relative
cost of capital in the U.S. and the pressure on American management for results in the
short-term. American managers in advanced technology industries claim that the high costs
— 25—
of capital forces them to forgo investments with low yields, even if these investments are
critical to the long-term health of the company (Burton, p.128). The high cost of capital in
the U.S. makes it easier to understand recent transatlantic mergers among defense
industries. According to Markusen, defense contractors that merge can spread the costs of
capital, research, and development across a greater number of contracts in order yield
higher profit margins (p.42). In this case, more mergers mean fewer competitors, fewer
firms driving down bids on contracts and greater political clout at lower costs. The result will
be a “patchwork” of weapons specialization across the globe (p.47).
This monopolization of the defense industry through transatlantic mergers creates
new risks in technology transfers in “dual-use” goods transactions. The decline in weapons
producers in the market would shift the balance-of-power orientation in the arms market
away from governments towards big business (Markusen, p.47). For instance, any militarily
weak country that feels compelled to buy products and services from say Lockheed Martin
or Grumman, may also acquire weapons-producing capacity as a result of their purchase
(p.47).
This situation is making it pertinent for the home and host countries to monitor new
technological developments that will lower future R&D costs as well as regulate the
proliferation of new technologies and production processes from foreign locations (Patel,
p.146). “If transatlantic mergers occur on anything like the domestic mergers of the 1990s, a
few international firms my soon sell to a dozen or more international buyers” (Markusen,
p.47). Under such circumstances, with many buyers and few sellers in the arms market, no
government would be completely free to design weapons to its specific needs, enjoy clear
technological superiority, or regulate the diffusion or technology beyond its borders. The
U.S. and its allies would face global “private arsenals” – huge firms with a monopoly over
various weapons lines (p.47). Although the business interests of these firms is guided by
— 26—
the principles of profit-maximization and acquiring export markets, the risk which is going
unnoticed is that these firms have a high degree of autonomy outside national boundaries
which nation-states fear.
Dickens argues that the transnational would prefer to see the removal of allregulatory barriers and constraints. These firms seek the freedom to relocate when they
wish, the ability to export capital and profits from local operations, the freedom to operate
unhindered in a local market, and the freedom to export and import materials, components,
and services as they see fit.
Dickens quotes Picciotto on the ambivalent nature of
transnationals towards the nation-state:
“Transnationals have favored minimal international coordination while
strongly supporting the national state, since they can take advantage of
regulatory differences and loopholes…While Transnationals have pressed for
an adequate coordination of national regulation, they have generally resisted
the strengthening of international state structures…It is their ability to exploit
national differences, both politically and economically, that gives them their
competitive advantage” (Dickens, p.244)
According to this viewpoint, transnationals are an exploitive and distortive influence.
In regards to national security, a transnational may choose to license technology (or even
subvert the licensing process of a critical technology) that one day may have military
application. This ambivalent nature of transnationals toward security is a high politics issue
in regard to the globalization of the U.S. defense industrial base.
In 1990, the U.S.
Department of Defense reported that one-quarter of the technologies essential to American
industry (especially defense) was held by non-U.S. firms (Moran, p.80).
While fans of globalization see this as a great by-product of comparative advantage
in the international economy by bringing superior performance, innovation, and lower prices
for military and commercial purchasers, it dismisses the issues of vulnerabilities in supplyside economics and the location of production sites critical to the home industry.
— 27—
“A survey of post-World War II experience suggests that external domination of
technology, goods and services may well lead to persistent attempts at meddling,
manipulation, and harassment in the recipient’s sovereign affairs, even in peacetime among
allies” (Moran, p.80).
This interference has ranged from the U.S. denial of computer
technology to inhibit France’s insistence to re-export products that incorporate foreign inputs
to country’s such as China, Cuba, and a few Middle Eastern states; to the retroactive
cancellation of licensing agreements with European partners involved in the development of
a Soviet gas pipeline to Western Europe during the Cold War” (Moran, p.80). Since the U.S.
has historically been the manipulator, the concern overlooked is the process working in
reverse in a post-Cold War, multi-polar environment. To protect economic efficiency and to
prevent the “meddling process” from working in reverse, requires channeling narrow
protectionist interests into those industrial sectors in which foreign domination actually poses
a threat and not where the lack of collusion by firms and countries prevents exploitation
(Moran, p.81).
The operations of transnationals are linked to national security not only because they
have tended to cluster in industries that are critical for conventional warfare, but also
because they have come to occupy a commanding place in the external transactions of
many countries. In both Britain and the U.S., more than a quarter of the exports of
manufactured goods consists of transactions between parents of transnationals and their
affiliates. In the short-run this generation of foreign exchange by transnationals is critical to
the economic position of the nation-state in the global economy (Vernon, p.95). In the long
run, Vernon argues that nation-states are becoming increasingly vulnerable to intra-firm
operations between transnationals. Transactions between two affiliates of a transnational
enterprise located in separate geographic regions are less easily reached by the regulatory
— 28—
devices of national governments than transactions that are undertaken at arms length
between unrelated parties (Vernon, p.96).
This concern over lack of regulation is especially critical in the field of research and
development. In the 1980s more than half of the internationalization of R&D among U.S.
and European companies came from mergers and acquisitions with little government
interference (Patel, p.146). “Accordingly, nations that feel a sense of vulnerability to outside
forces as a result of a high-level of foreign transactions of this type have that feeling
heightened when the transactions are ‘internal’ to the multinational enterprise; and
heightened still further when the parent of the enterprise is located on foreign soil” (Vernon,
p.96). From a national security perspective, the question is whether or not given the nature
of the transnational and how it operates, does a nation-state increase its well being by
encouraging the establishment of these entities?
Vernon argues that given the lopsided relationship, the utility in national security
derived from transnationals is declining, and will further aggravate its relationship with the
state (Vernon, p.120).
His argument for the decline in this utility stems from that fact that
since nation-states are losing the ability to be affective containers and regulators in an
economy of “competitive states” they are in poorer positions to defend the interests of their
overseas enterprises. Given this fact, transnationals will adjust and further reduce the utility
of these entities as instruments of national security policy. Transnationals will continue to
pursue their natural bent---the creative business of moving ideas, money, people, and goods
in increasing volumes across international boundaries (Vernon, p.121).
As a result, the nation-state should retrench and find ways to hold transnationals
accountable for behavior that compromises national security. This concern should force both
government and industry to rethink their traditional roles in the development of technology
and application of technology. It stems from one overriding fact:
— 29—
“ When it comes to advanced technology, national security can no longer be
viewed in purely military terms; economic security is a vital consideration.
Moreover, just as it is increasingly difficult to make a meaningful policy
distinction between military and commercial technologies, so it is difficult to
determine how to manage international relationships, since important political
allies in military technology are often hard-nosed economic competitors in
commercial technology” (Burton, p.116).
2.4 Increasing Military Capabilities through International Transactions in an
Interdependent Environment
Inevitably, a transnational firm’s involvement in international trade has strategic and
security implications for the nation-state. As Adam Smith observed, international trade is the
route through which nations have achieved opulence---and opulence is necessary for
national defense (Schlessinger, p.135).
By participating in the international market to
exchange resources through trade, a nation may sharply rise its national income, thus
providing additional resources for its national power (Schlessinger, 135).
The strategic
implication of trade is that as the nation increases its wealth, it increases its productive
potential for war by enlarging its national product. Nations such as Great Britain and Japan,
who have limited supplies of natural resources, may not have risen to great power status if it
were not for the increase in their productivity through international trade.
A proportion of every nation-state’s economic capacity is devoted to maintaining and
improving its power status. During the Cold War the U.S. and the Soviet Union accounted
for 60% of the defense outlays of all countries (Knorr, p.184). Changes in a country’s
overall economic capacity will naturally affect their military potential. Today, the military
capabilities of the former Soviet Union have been severely weakened by the collapse of its
economic base, whereas the economic base of the U.S. has increased as a smaller
proportion of its GNP has been devoted to defense in the post-Cold War era.
In addition to economic capacity, the structure of a nation's economy is important in
judging its military capabilities.
Many countries can produce just about all the necessary
— 30—
things needed for the maintenance of its military. “Ever since warfare has become
industrialized, the level of industrial and technological development has been a major factor
in determining a country’s ability to produce sophisticated arms and its ability to service and
employ those arms efficiently” (Knorr, p.185).
The production of arms requires massive inputs of high-level resources (i.e. the
aerospace industry). “The importance of a country’s technological base has been further
elevated by the accelerating rate of weapons obsolescence. Survival in this competition
makes inordinate demands on precious resources available for Research and Development
(R&D) that yield a stream of improved designs and inventions that are in turn supported by a
rich infrastructure of scientific progress” (Knorr, p.186). A state that falls behind in this
scientific race courts technological dominance and surprise by other states. The pressure to
keep up drives the technological competition. This was dramatically illustrated in nuclear
weapons tests by India, quickly followed by Pakistan in 1998.
Because today’s modern weapon systems can only be produced in a small number
of countries, the military potential of all other countries would be “outclassed” were it not for
the international transfer of arms and inputs in international trade. For example China and
India have increased their capacity to produce nuclear weapons through the importation of
technological inputs from industrial states to build nuclear reactors (Knorr, p.187). New
studies on the impact of arms transfers and related technology on economic capacity, is
showing that industrialized countries gain no more efficient utilization of foreign military and
related technology than do developing countries (Li, p.486).
2.5 Measuring Increased Military Potential from International Transactions
One of the major efforts today in modern growth theory is to measure the impact of
technology on growth, or the relative change in a country’s total factor-productivity. Defense
economists are examining this shift in a country’s aggregate production function as a result
— 31—
of technological change from innovative activities (Li, p.487). It is found that on the lower
end (i.e. countries that have to import arms and related technology), the technological level
of the importing can be upgraded through the transfer. This occurs if the transfer leads to
an
improvement
in
human
capital,
new
infrastructure
construction,
and
the
adaptability/installation of the new technology in the civilian sector. If these criteria are met,
the aggregate production function of the country should reflect an efficiency change as well
as a technical change.
For this model to work, defense economists have broken away from neoclassical
theory by making technology an exogenous variable (Li, p.487). This shift in thinking is
required because neoclassical theory has provided little evidence that countries converge to
the same growth rate (Li, p.487). The argument in new trade theory is that economic growth
is disproportionate from country to country because trade flows are no longer static as
assumed in Ricardo’s comparative advantage model. They are however stochastic
(variable) because the transnational firm makes the factors of production (labor, capital, and
technology) very mobile as well as making trade and production flows follow economies of
scale.
The counter argument to these findings suggest that given the indistinguishability
between civilian and military technology, technology transfers through, say licensing
arrangements, may provide no benefit for the country’s aggregate production function. This
result occurs only if there is no adaptability between the technology and civilian sector and if
the new technology acquired diverts resources needed for growth away from the economy
(Li, p.487).
As technology diffuses through international trade and the R&D operations of
transnationals, it is far from clear if these less developed countries importing complex
weapon systems are capable of maintaining and employing these systems in the future. But
— 32—
as some Middle Eastern countries have demonstrated, these countries can learn to employ,
with considerable effectiveness, complex weapon systems capable of destroying aircraft,
tanks, and ships without any increase in economic capacity.
But although the international transfer of complex weapons systems has resulted in
the diffusion of military technology, dependency by these countries on the required inputs to
maintain them becomes part of a checks and balance system between nation-states
involved. In this case a large country can enforce export controls to prevent required
technological inputs from being transferred to another nation-state that has designs to
modernize its weapons systems. And this power relationship can be used coercively by the
exporting countries to influence political and economic behavior of the importing countries.
But if international trade is a vehicle through which a nation can increase its
productive capacity to improve its military capabilities, then it is necessary to see how a
nation’s military base can benefit through these private economic interactions. This is done
through R&D.
In U.S. trade policy there has been significant concern with promoting activities, such
as R&D by U.S. corporations overseas to lower operation costs, which may have valuable
spillover affects to other economies. This means that international trade is a vehicle for
technological advancement. Unlike the era of Smith and Ricardo who viewed the factors of
production as immobile, so that countries benefited from trade by their comparative
differences in these factors, trade today is dominated by the exchange of a country’s
particular strength in these factors.
“Trade seems to reflect arbitrary or temporary
advantages from economies of scale or shifting leads in close technological races”
(Krugman, p. 76, 1991).
With the increasingly important role technology plays in
international trade, it is important to examine the externalities created by trade which can
benefit a country’s military capabilities.
— 33—
2.6 Externalities in Trade and a Country’s Military Capabilities
In economics, the term externality means a “benefit from some activity that accrues
to other individuals or firms than those engaging in the activity” (Krugman, p.80, 1991).
Defense is an excellent example of a public good that exhibits externalities.
National
defense provided at the expense of the nation-state provides the positive externality of
security to society.
A clear illustration of this type of externality occurred during the Cold War, when
Europe and Japan flourished economically by diverting the resources it would need for
Communist containment towards their economic growth. This was possible thanks to an
U.S. umbrella of security provided to the free world. The externality created is positive if the
relationship between the provider and beneficiary is reciprocal. In our Cold War case, the
U.S. provided security to the free world in exchange for access to its allies’ markets to
exchange goods and services needed to maintain U.S. military preponderance.
From a security perspective an externality may be negative if the relative gains by
both parties is proportioned unevenly.
For this to happen, the spillover affect from a
transaction or provision, of say defense, increases the economic and military capacity of a
country vis-a-vie the supplier. A good example in economics is the diffusion of tech-knowhow generated in one area to other firms in other sectors.
For example, if China acquires the technical-know-how to improve satellite
technology through import licensing arrangements, the return on capital could be the
improvement of missile delivery systems that may threaten the stability of East and
Southeast Asia, as well as complicate security relations with the U.S. This security issue
becomes relevant if and only if China exhibits a relative increase in its total-factor
productivity affording the country an increase in technical and productive efficiency. The
— 34—
relevancy increases in regard to the discussion of “dual-use” technology transfer in
international transaction
2.7 “Dual-use” Technology Transfers and its Problems
In the post-Cold War era of declining defense expenditures, defense producers have
responded by the implementation of “dual-use” policies to offset the continuing growth in the
cost of capital and R&D, as well as to adapt to the ever changing relationship between
military and civilian technologies (Molas-Gallart, p. 367). Long lists can be compiled of
technologies developed for civilian uses that then later spread to military use, and viceversa. For instance, civilian aerospace technology has borrowed heavily from the defense
sector. Although the continuous growth of commercial markets has been able to sustain the
rapidly growing costs of R&D and capital investments, shortened-product cycles and stifling
defense expenditures have blunted the competitive edge of this commercial/defense
technology (Molas-Gallart, p.367).
It is being found that commercially sponsored R&D is supplying the most advanced
technologies to the military sectors of economies. Rather than the commercial sector being
subordinate to the military sector, the process has now been reversed.
Advanced
commercial technologies are now being applied to today’s most advanced weapons
systems (Molas-Gallart, p.368).
For the defense economist and defense planner, the
concern is the control of the transfer mechanism and negative externalities to security
created by them.
It is important here to redefine the concept of “dual-use” transfer. “Dual-use” transfer
refers to ways by which items used in one area can be adapted to another. Semiconductors
are a perfect example of a commercial technology later applied to military technology. The
importance of this issue could be seen during the U.S.-Japanese trade negotiations in the
— 35—
late 1980s over semiconductors.
At the time, Japan was the industrial leader in the
production of semiconductors, and the U.S. the major importer.
From an arms control outlook, “dual-use” technology has been seen as a problem for
the control of the proliferation of advanced weaponry. The problem for conflict in a liberal
trade environment arises when the availability of “dual-use” systems is confined to a limited
set of industrial countries, with the aim of making existing technology trade discriminatory to
all other countries (Molas-Gallart, p.369).
The result is conflict and attempts by other
countries to circumvent collective security arrangements provided to regulate the
proliferation of such advanced technology. In reality there is a diversity of civilian
technologies available to a larger set of countries, including developing countries, that can
be applied to military developments. The success of a “dual-use” transfer is dependent on
the ability of the country to adapt these technologies to its military sectors. According to
Malos-Gallart (p. 370) “dual-use” products can be:
1) Applicable to defense and civilian use without any need for modification (e.g.
steel). Companies that consider defense as one of their customers will often
manufacture these products.
2) Adapted for a use different from the one initially intended. Adaptation and further
development have been necessary for most products ‘spun-off’ from military
applications, like electronic computers, radar, numeric control machines,
transport containers, microwave ovens, etc.
3) Deliberately designed with more than one use in mind.
Molas-Gallart goes on to state that the mechanism through which to exploit “dualuse” products will depend on their position within the production process, and whether or not
they are fully-operational systems or sub systems to be sold to customer. Fortunately, many
final systems are not “dual-use” because they can not be adapted to carry out any other task
than the one intended to be carried out (p. 371). Although the final product itself may not be
“dual-use”, its components and subsystems maybe. “Any complex weapon system is bound
— 36—
to contain certain components which would be adapted to have another form other than
civilian use” (Molas-Gallart, p.371).
Military consumers and producers are keen to explore all possibilities of applying
civilian components and subsystems to defensive and offensive capabilities, for the purpose
to help control cost escalations. The type of transfer mechanism will determine the future
possibility of any adaptation. For instance certain products are not adaptable to the civilian
sector, given their special production requirements. Molas-Gallart notes:
“In the field of titanium, where the product is clearly a “dual-use” technology,
the production processes that have been developed in the military-aerospace
sectors are not suitable for other, civilian, high-volume applications. In a
neighboring sector, it has been pointed out that the same composite
materials are applicable to defense and commercial applications; however
some of the processes needed in the military sector (like surface
manufacturing for stealth capability) have no commercial application” (p.371).
Given the indistinguishability of civilian and military technology as it moves along the
transfer mechanisms of intra-firm trade, it is important to examine the production processes
of final systems and subsystems. This is necessary to determine if a traded product can be
adapted/improved without great amounts of resources needed to be added to make the
product altered from its initial use. It is important to see how trade of a “dual-use” product
can close the technological gap between countries in such a way that the economic/military
capabilities of the importing country are improved.
2.8 Closing the Technology Gap: Large Country vs. Small Country
Trade economist Paul Krugman acknowledges that technological innovation in
developed countries and the transfer of technology to less developed countries plays an
important role in determining the pattern of world trade and changes in trade patterns over
time (p.139, 1991). In Krugman’s model, the process of technological transfer in trade turns
new goods which developed countries export, into old goods which are public domain and
less developed countries can innovate from.
— 37—
He provides in an explanation for the shortened time lag in the international
production cycle that the number of new goods invented depends heavily on the number of
goods developed and available in the market (Krugman, p. 144, 1991). This is why the
proliferation of advanced technology is so critical, because it increases the probability of a
technological breakthrough by a competitor country.
In Krugman’s model, each good is innovated, developed, and exported by the North.
When the technology becomes available from the already existing goods in the marketplace,
the technology becomes available to the South. The result is a movement of industry to the
South. This has already occurred as many private defense firms have moved production
processes away from their home territory and provided more products in the world market.
Comparative advantage has shifted to the South as transnationals move their operations
there to take advantage of capital savings and lower wages that have not yet been affected
by the increase in technical change and efficiency. (Krugman, p. 145, 1991). The South
then gains in productivity by adapting the production processes of the transnational.
According to Krugman, it becomes immediately apparent that by increasing the
range of products and services, there is an increase in world productivity as the technology
becomes available to less developed countries. Following Li’s analysis, the relative totalfactor productivity of some of these countries will increase as production and R&D
processes move from the developed countries to these new territories to take advantage of
cost differences.
This will be reflected in an improvement of human capital, new
infrastructure and adaptability of new goods to the civilian or military sectors. Although
innovation may benefit the developed country, the technology transfer benefits the less
developed country as more and more products become available on the market.
The purpose of Krugman’s model is to be distinctively different from the traditional
Ricardian model of comparative advantage.
The model assumes a continuous process of
— 38—
technological change and progress that takes the form of new products and not obsolete
products manufactured by less developed countries. The danger is an increase in
vulnerability to the North by possible supply side shocks in critical components now being
produced in the South.
The relative gains from trade have now fostered conflictual relationships between the
North (importer of components) and the South (which now has improved it terms of trade
and leverage against the North). As a result, the South closes the “technology gap”. An
important asymmetrical relationship appears: “Technical progress in the most advanced
country always benefits the less advanced countries” (Krugman, p. 153, 1991).
As a result, the externalities created in international trade have made trade a “zerosum” game, which holds contrary to liberal views. This means that trade flows are guided by
the economies of scale (in search of capital savings and lower labor costs) that affect the
“strategic sectors” of the home economy.
And, because of the increased role of
technological competition, it becomes more plausible that certain sectors, such as “dualuse” technologies having no military application now but may so in the future, yield important
external economies that may benefit an adversary’s military capabilities.
3.0 National Security and Technology Transfer: Strategic Dimension of EastWest Trade in the Cold War
The relationship between technology and international relations is paradoxical: “It
has at once fostered interdependence and cooperation and sharply divided nations by
heightening national competition and global projection” (Bertsch, p.1). The transfer and
acquisition of advanced technologies through international trade were central ingredients in
the high-power politics of the Cold War. The purpose of this section is to organize the
security issues in international trade discussed so far. It should be evident from examples to
be given that through international trade, the Soviet Union was able to benefit from the
— 39—
diffusion of technology that in turn allowed the country to increase its economic/military
productive capacities.
The most difficult issue in U.S. foreign economic policy concerning the East-West
trade dimension had to do with trade in “dual-use” technologies.
As mentioned in the
previous section, this was the proposed sale of commercial goods that may have had a
significant military application. This was trade in a “gray area” of such goods as computers,
fiber optics, jet engines, semiconductors, and telecommunications equipment. In recent
years, decisions about which technologies to restrict centered around the tradeoffs between
national security risks, the economic benefits to the parties of the traded goods, and the
political affects of the proposed sale. Robert Klitgaard states that the policy problem in trade
of “dual-use” goods is “to structure and to manage the tradeoff between our benefits from
trade and the adverse implications” (Bertsch, p. 3).
It is clear from writings on trade theory, dating back to Adam Smith, that the
economic health of an economy is fundamental to its national security. During the Cold
War, many economic nationalists viewed East-West trade as making an inequitable
contribution to Soviet economic strength and military capabilities. The claim is that certain
trades in “dual-use” goods made a direct contribution to the Soviet military sector, and even
non-strategic industrial trades made important contributions to the development of Soviet
defense related industries.
“Even such non-military commerce as agriculture and grain
trade was sometimes seen as ‘resource freeing’, that is allowing the Soviet Union to free
resources for its military sector rather than forcing the country to invest elsewhere to solve
its economic and agricultural problems” (Bertcsh, p.21).
Important in trade with an adversary or competitor is that what may be beneficial to
the firm conducting the transaction, may not be good in the aggregate for the home country.
One of the major obstacles in trade policy with East Europe and Soviet Union, was the
— 40—
varying assessment of the need for trade with that part of the world. In the 1980s Germany
was the Eastern bloc’s largest trading partner, with some 6.2% of its total trade going to the
East (Bertsch, p. 22). During the Cold War, Western Europe and Japan valued their trade
with the East, and were always reluctant to join in any alliance policy that restricted this
activity. The U.S. saw such trade as having a “boomerang” affect on export competition with
domestic companies.
To recall Krugman’s trade model, as new products and the accompanying
technology become available in the market, less developed countries were able to benefit by
manufacturing these new products and re-exporting them at lower costs. An example of this
strategic concern in the East-West trade dimension was that prior to 1977 the Soviet Union
was not an exporter of ammonia.
But after signing and agreement with Occidental
Petroleum in 1978, the Soviet Union became the second largest exporter of U.S. ammonia.
“As result, the U.S. experienced several plant closures, declining ammonia prices, and
serious market disruption for domestic anhydrous ammonia” (Bertsch, p. 23).
The impact of the importation of advanced technology on Soviet economic and
military capacity received the most attention. Some have claimed that almost all of Soviet
technical achievements in The Cold War were attributed to Western, advanced technology
through legal acquisitions or covert means (Cooper, p.80). Prior to the 1990s, Soviet
reliance on Western technology was a decisive factor in alleviating or diverting an economic
crisis.
The proposed benefit of the importation of Western technology to the Soviet
economy was to achieve larger economies of scale that socialist development was not
capable of doing. But as Cooper points out, socialist systems are not sufficiently technically
dynamic as such to increase a country’s relative total-factor productivity to reap the benefits
of better efficiency from new infrastructure and improvements in human capital (p. 80).
— 41—
3.1 The Dynamic Benefits of East-West Trade to Soviet Economic/Military
Capabilities
Wolf argues that the importation of Western technology was critical to early Soviet
drives to industrialize (p. 35). In 1955, 1.6% and 5.6% percent of Soviet imports accounted
for Western machinery (p.35).
In 1976, imports of Western machinery and equipment
peaked at 41.4 % (Cooper, p. 87). In the same time period high-technology product imports
were 16.2% in 1970, 13.6% in 1975, 16.1% in 1977, and declining to 11.7% in 1980
(Cooper, p.89). In the same time period there was access to some restricted technologies
such as aerospace engines, nuclear reactor equipment, electronic components, ball
bearings, and X-ray equipment (Cooper, p.89).
Studies at the time concluded that the marginal product of this imported Western
machinery was fifteen times greater than indigenous Soviet machinery (Wolf, p.36). In 1982
according to the Central Intelligence Agency, legal acquisitions of western technology had
their greatest impact on the Soviet’s industrial base, and thus affected military technology on
a relatively long-term basis (p. 94). The CIA reported:
“The Soviet Kama Truck Plant, for example was built over seven years with
massive imports of more than $1.5 billion worth of U.S. and West European
automotive production equipment and technology. Large numbers of militaryspecification trucks produced at the plant in 1981 were being used by Soviet
forces in Afghanistan and by Soviet military units in Eastern Europe opposite
NATO forces. Similarly, large Soviet purchases of printed circuit board
technology and numerically controlled machine tools from the West already
benefited military manufacturing sectors” (CIA, p.95).
In 1983, the CIA also concluded that legal acquisitions of know-how and technical
components that are “dual-use” and applicable to the microelectronics field enabled the
Soviets to meet 100% of the microelectronic needs for military purposes (Holloway, p.179).
Another most notable incident of the impact of the trade of “dual-use” goods by
transnationals with an adversary occurred in 1972 with the U.S. approval of the sale of 168
precision grinding machines, manufactured by the Bryant Grinder Corporation, to the Soviet
— 42—
Union (Holloway, p.181). The CIA insisted that these machines made it possible for the
Soviet Union to produce the micro-ballbearings needed for functioning gyroscopes and
accelerometers in missile guidance systems, and without them the missile accuracy of their
country could not have been so markedly improved (Holloway, p.181).
A counter study, to the satisfaction of security specialists, showed that given the
resource demanding nature of Western capital investments, importing such technology
appeared to be less attractive than at first glance. Wolf cites Japan as a similar example of
the Soviets inability to incorporate Western capital investments into its economy and
infrastructure (p. 36). The opportunity costs to the Soviet Union would have been significant
to the extent that the best resources would be need to be transferred from other projects to
make the capital investments operational.
This Soviet case exemplifies back to Li’s analysis of how total-factor productivity
varies from country to country when importing the same technology. But in a large countrysmall country trade case, the Soviet Union (being the smaller country economically) gained
more dynamically than the U.S. in importation of advanced technology. However, Wolf
argues that the dynamic gains to the Soviets derived more from hard-currency borrowing
from Western European creditors to finance its imports of western technology (p.37).
Regardless of the debate then and today, it is widely agreed that the U.S., in pursuit
of maintaining détente took advantage of growing East-West trade for foreign policy
leverage when it came to security.
Political considerations and tolerating trade
discrimination visa-a-vie Western Europe and Japan proved that economic preponderance
was more central than security. It was believed that the current export control system would
monitor relative gains acquired by the Soviets in international trade transactions.
It is now being realized that there are more products on the open market that are
“dual-use” (e.g. ballbearings in gyroscopes that allowed for improved Soviet missile
— 43—
accuracy) and not affected by export controls. The danger is that export control policy is
handled on a case by case basis, after the fact, when a corporation licenses or sells goods
and technology that may have future military applications.
4.0 Export Controls, China & Hughes Electronics Corporation—National
Security Compromised?
4.1 The Disutilty of the Current Export Control Regime
Export controls on “dual-use” goods are an instrument of national security for the
regulation of transnationals’ behavior. As nation-states act more competitively, this control
system has been loosened.
Against the backdrop of Vernon’s earlier argument, the
transnational enterprise has lost its utility as a national security instrument since the goal of
the entity is to exploit “loopholes” that will further its own economic interests.
The trends leading to this compromise began against the backdrop of declining
defense spending at the end of the Cold War, former adversaries no longer being perceived
as threats, and deeper integration of the U.S. into the global economy. As the 1990s began,
well-defined geopolitical and technological trends increased pressure on the U.S. to narrow
or eliminate export controls in East-West trade. Senator John Heinz reported the following
trends in 1991:
1) Decreasing geopolitical tensions in Europe and pressure on the U.S. to remove
or relax current trade restrictions to the Soviet bloc, particularly Poland and
Hungary.
2) A decreasing if not vanishing view of China as a threat to national security and
pressure on the U.S. to prescribe China to a shorter export control list.
3) Increasing domestic pressure on the U.S. to eliminate or narrow export controls
West-West, which accounted for 80 percent of U.S. trade.
4) Increasing pressure to redirect the export control regime towards the Third World
to prevent the proliferation of weapons of mass destruction.
— 44—
5) Increasing globalization, commoditization, and foreign availability of technologies
outside the Western Alliance, a trend noted to be a leading decline of exports
and loss of technology leadership by U.S. industry (Heinz, p.3)
Since the passing of the Export Control Act of 1949, export controls have been an
integral part of U.S. foreign economic policy used for purposes of persuasion, reward, or
punishment in order to influence the internal politics or foreign actions of another state. The
purpose of export controls was to restrict scarce resources and technology that would
contribute to increasing the military capability of a real or potential enemy (Heinz, p.3).
However against the backdrop of a competitive state in a globalized and commoditized
economy such controls are viewed as restrictive and creating a negative externality in the
nation-state’s overall economic welfare.
Relaxation of these controls was viewed against the negative consequences of
declining exports in high technology and “dual-use” goods in the late 1980s. The U.S.
export control regime is by far the most restrictive in the world. Against the backdrop of the
Cold War, these restrictive measures on international trade of certain goods would appear to
put the U.S. at an economic disadvantage.
Such restrictions affect export oriented
companies and force upon them a global production strategy to relocate R&D and
manufacturing closer to target markets around the world.
Data on U.S. export levels in high technology goods is compelling to explain this
transition. High technology accounts for over 45 percent of manufactured exports in the
world. In 1986, the U.S. registered its first trade deficit in high technology of $2.5 billion
(Heinz, p.113). Between 1983 and 1984, high-tech trade for the U.S. decreased by some
$18.7 billion.
During these years the defense industry argued that restrictive trade controls
had led to an imbalance between arms cooperation and technology transfer policies.
According to industry insiders, the U.S. would benefit by a shift from a unilateral export
control system to a multilateral system.
— 45—
The National Academy of Science argues that the negative reception of the
international business environment to export controls has been a big factor in the loosening
of these safeguards by the U.S. According to a report in 1986, 52 percent of U.S. business
lost sales to foreign customers as a consequence of export controls. In more than 212
separate instances, business deals were turned down by advanced industrialized nations
with U.S. companies because of controls. Additionally, 38 percent of U.S. firms had
overseas customers wishing to shift to non-U.S. sources of supply to avoid entanglements
with U.S. export controls. This information suggests that this independent variable had a
significant relationship on the U.S. trade deficit in “dual-use” goods.
Although the goal of the administration has been to regain export competitiveness in
“dual-use” goods by having firms operate under less stringent controls, the period of relative
peace with our former Cold War adversaries has led the U.S. to forget the purpose of these
controls: to restrict technology transfer that will increase the economic-military capabilities of
a foreign power visa-vise the U.S.
Trade economists would argue that export controls are a form of strategic trade
policy to protect industries that are highly vulnerable to shortened international production
cycles. At the same time this forces foreign firms abroad to pay higher prices for
technological inputs and information as well to increase their reliance on the technological
prowess of the U.S. The international environment has changed in such a way that this
argument makes sense. The controls themselves are a “necessary evil” in free trade that
will neither be perfect or permanent. Their purpose is to protect U.S. overseas markets in
high technology.
There are new factors in the international environment that Heinz did not take into
account:
1) There is greater scientific and technological parity between industrialized nations.
— 46—
2) There has been the emergence of new major exporters in the past decade;
especially among the new industrialized economies of Southeast Asia that are
vying for the same global markets and have a high degree of import penetration
in the U.S.
3) And, as mentioned previously, transnational corporations are being held less
accountable for their operations in host economies, compromising national
security interests.
Defense planners argue that these controls are needed to help prevent the rapid
erosion of the technological advantage we have left. The dilemma facing the nation-state in
a growing free/managed trade environment is how to prevent these necessary controls from
interfering unnecessarily with commercial trade and development.
4.2 Assessment of the critical issues surrounding export controls
National security export control policy should be the result of a process that weighs
the benefits of controls in relation to potential adversaries against the costs in terms of the
domestic economy and relations with allies and friendly trading partners (National Academy
of Science, p.8). In terms of making correct policy decisions regarding these controls are
that their costs are hard to measure because they “derive from the web of competitive and
cooperative relationships among western countries” (National Academy of Science, p.9). In
terms of these costs, the principle concern has been on future sales and market share in
international trade.
For example, reduced revenue from lost sales and market share may translate into
less investment, a lower overall growth rate in the member economies, reduced innovation
and friction in relations among trading partners. For instance, the short-run loss attributable
to export controls in 1986 was about 10 percent of total U.S. exports.
The adverse
competitive affects of export controls can be alleviated according to economists by the
establishment of common controls in “dual-use” technology, a control system that does not
exist at the moment.
— 47—
The bearing question is what is the appropriate point at which the nation-state can
interfere with technology transfers without damaging international economic relations and
giving cause to transnationals to relocate abroad and forcing a compromise in national
security priorities? There are two perspectives that can be looked at. The first interference
point would be where the economic costs of export controls to U.S. firms over a period of
time, resulting in a slower growth rate of a nation’s economy, has future negative
repercussions on the compensations in national security derived from the controls. In 1986,
the National Academy of Science calculated that the annual direct costs to U.S. exporting
from the interference of controls would be $9 billion annually, associated with an annual
reduction of employment of 200,000 in the export manufacturing sector of the economy
(National Academy of Science, p.121). In addition, the application of a standard economic
multiplier for the total reduction in the 1985 U.S. GNP forecasted a reduction in investment,
research, and development of approximately $17 billion. The majority of these leakages
have been reported with Western Europe and Japan.
These losses are expected to
increase with competition from the trading blocs of Southeast Asia and Latin America. The
second perspective is of course opposite of the first. Interference would occur at that point
where the compromised costs of future national security is compromised by the economic
gains of firms through technology transfers and trade of “dual-use” goods in diversions and
legal sales.
It is worth noting that diversions are hard to detect. They can occur at any point in
the export process: It includes fraud in pre-license or post-license documentation, theft
during transshipment, and unauthorized post-shipment.
A number of potential foreign
adversaries have sophisticated multinational diversion mechanisms that make the sales look
legal and escape counterintelligence detection.
— 48—
Identifying diversions is especially
problematic while goods are in transit through the bonded or custom free zones maintained
in most countries.
In July 1986, the U.S. government uncovered a diversion of a large shipment of
computers and related sensitive equipment in the tens of millions of dollars. The equipment
which was believed to have been destined for the Soviet Union had first been routed to
Belgium and then to a Turkish buyer in Austria. A second instance involved Richard Mueller,
a Western German citizen, whom had an established network of over 75 “dummy” and
“front” firms in Western Europe to purchase products and technology to be destined for the
Soviet Union and other foreign adversaries.
So how should the interfering point of the nation-state be handled to prevent such
diversions, when nation-states are behaving more like firms in the global economy?
Because sources of products and technology exist elsewhere in the world, and because
most diversions involve activities in other Western nations, the current U.S. export control
effort, some argue, must be multinational.
The environments for a multinational export control regime maybe very receptive
given the emergence of trading blocs and other multilateral trade arrangements. With the
strong push towards greater free trade and increasing debate around how to hold
transnational firms accountable for behavior that affect nation-states, a multilateral effort
may be affective if the a strong base of enforcement mechanism is held in place.
Such a multilateral effort would need to involve a transnational defense-industrial
policy (Markusen, p.48). Given the described behavior of transnationals and the trend in
transatlantic mergers and acquisitions by U.S. and European defense contractors, nationstates would be in a better position through such a multilateral defense-industrial policy that
would help keep these companies in check.
This would involve an internationally
coordinated strategy that would assess the defense needs of each partner country, chart an
— 49—
efficient economic course for meeting those needs, and restrain arms proliferation.
A
transnational defense-industrial policy would build on established arrangements between
countries and “mirror the commitments with a transparent system that documents, guides,
and rightsizes the industry to achieve efficiency, preserve a modicum of competition, and
keep the lid on arms proliferation” (p.49). From its appearance, a transnational industrialdefense policy is analogous to “new wine in old bottles”. Yet, since there are trade-offs
between economics and security, this type of policy would help prevent a nation-state from
“cutting off is nose in despise of its face” economically; as well help ensure the balance-ofpower orientation in the arms market is still tilted in the favor of governments and not begin
business. So how would such a policy be done? This would begin with three progressive
steps: knowledge sharing, coordinated defense-industrial base management, and ultimately
joint procurement (p. 49).
In the first steps, nation-states involved would need to create a common knowledge
base about their defense industries, including efficiency analyses of plant and design team
size, ongoing evaluation of excess capacity, and profiles of the technical and business
strengths and weaknesses of major contractor (p. 49). The first step does not mean for a
nation-state to “give away the farm” on its military and weapons capabilities, but establishing
a base of knowledge would help prevent future arms races that result from the guessing
games about the military strength of one’s adversary.
And amazingly enough the
information is publicly out there. By comparison to other countries, the information publicly
available in the United States on it defense contractors, includes data on distribution of
defense contracts by firm, region, and industry, as well as the dependency of individual
industries and occupations on defense dollars. This type of information shared would be
crucial in helping advise nation-states on defense spending and military/civilian industries
integration programs.
— 50—
Once a base of public knowledge has been established between partner countries,
then the second step, market coordination in the arms market, can take place. For this to
happen would require a new multilateral organization to distinguish between desirable and
undesirable partnerships between transnationals (p. 49). This second step is where
economics and security can be helped to stay in balance. This new body would review
proposed transnational mergers between industries, and ensure that no merger or
acquisition would endanger security, hamper competition, or concentrate to much economic
and political clout with one firm (p.49). Following an approved merger, this body would
identify where overlapping operations were, shut them down, and then institute alternative
development strategies to assist regions facing the sharp end of defense conversion. This
type of market coordination would in way help regulate military/commercial integration of
enterprises, as well as help reduce the risk of one company or region having the relative
design and production advantage of important components and sub-components in a
weapons system. According to Markusen, The EU’s KONVER program, which finances and
advises planning on future European base and shipyard program has shown that such a
market coordination model does work (p.49).
Finally, in the third step, governments would engage in joint-procurement programs.
In this case, domestic and international firms would engage in competition for weapons
contracts. This would not only help create a fairer market, but it helps ensure that the
balance-of-power in the arms market stays in favor of government and not business.
The
present Joint Strike Fighter program is an example of this type of collaboration. Instead of
allowing government and firms negotiating deals over contracts in secret, joint-procurement
would help negotiate an open and fair division of labor among competing countries.
It would be foolish to think that transnational industrial-base policies are easy to
develop. There are legitimate obstacles such as the unwillingness to sacrifice sovereignty
— 51—
and the potential costs to employment when defense conversions take place. As well, very
few or even no states would bother to engage in the knowledge sharing of their military
industrial base. But the obstacles can be reduced through already established cooperative,
bilateral arrangements. In a relatively peaceful security environment, fiscal austerity and a
troubled world economy, should propel countries to engage in such a policy. Doing so
would be especially pertinent given the compromise to export-controls by a globalized
defense industry.
4.3 The Futility of a Multilateral Export Control Regime
It is agreed that with increased global interdependence, one country’s relative
capabilities often depend on the external actors and events. This has been heightened
more as nation-states assume the roles of “competitive states” rather than regulators and as
transnationals alter their global production strategies to take advantage of the structure of
the current export control systems of nation-states. With emerging trade blocs and the
removal of trade barriers, accompanying this should be a goal of collective economic
security among the member participants.
The optimist perspective of a multilateral export control arrangement is to foster joint
gains, rather than have unilateral efforts to seek individual gains, since these efforts are
often met with retaliation by trading partners and eventual joint loss (Meltzer, p.202).
According to Meltzer, what are needed for this to work are assessment, regulations, the
provision of equity among member states, and the concept of emergency relief.
Assessment is simple in that it allows members of an arrangement to collect and
evaluate information on perceived threats to collective economic security. Such a task can
play a vital role in mitigating crisis conditions and instituting “early warning systems”
designed to activate multilateral remedies. The most recent financial crisis in Asia reopened
this discussion on the effectiveness of institutions such as the World Bank and the IMF
— 52—
regarding the effectiveness of their economic surveillance activities in critical countries.
When these crises erupt, the chance for conflict increases.
Regulation is the second important priority.
The establishment of internationally
accepted rules governing behavior is especially critical. Many issues such as scarcity of
supply and export control concerns have arisen, and GATT codes and the most recent WTO
have provided little regulatory guidance in these matters.
The third priority is equity. This task relates to the insurance of joint gains and fair
distributive efforts of affects among member states.
This is especially important to
developing economies that are being integrated at an uncontrollable rate into the
international market place. The problem of accommodating economic welfare is difficult
because it has both international and intranational dimensions that must be dealt with. This
is a critical issue in technology transfer as Western states want to control the flow of
technology and information to less developed economies which have the potential to erode
the competitive advantage of Western states in certain product sectors such as
microelectronics and telecommunications. This becomes more apparent as transnationals
relocate research and development to these markets.
The final priority is international emergency relief.
This will add the capacity to
extend multilateral relief for short-term, severe difficulties is essential to avoid responses to
trade problems that would lead to joint losses among other members.
For instance in
commodity trade, price and supply conditions are subject to manmade and natural
disruptions that can create acute crises.
Relief provisions would alleviate deprivations
threatening a collapse in collective economic security.
Put together, are these provisions enough to create an enforceable multilateral
export regime?
The important factors to look at would be the increasing cost of this
interdependence and the systems ability to be a deterrent to transnational firms’ behavior.
— 53—
Meltzer argues that collective economic security arrangements come with such high
interdependence costs that nation-states are less willing to engage fully into them. Broadly
these costs entail the acceptance of circumscribed options or loss of autonomy by national
governments, often leading to increased exposure to disruptions caused by external
economic activity. In addition, there are often significant costs that stem from these
collaborative agreements such as acceptance of smaller market shares for exports or
devoting specified resources for the maintenance of supplies of scarce resources. Nationstates tend to see the maintenance of short-term positions in a problematic arena as far
better than giving up for instance market share for increased collective security.
The second problem is the pressure by transnational firms on its host economies to
not partake in these arrangements. Transnationals have different priorities than nationstates and would view these arrangements as impeding their freedoms of mobility and
exporting. It is obvious that no such international body or even multilateral export control
regime could regulate the behavior of a transnational. During the Cold War, transnationals
got around multilateral export control agreements between the U.S. and CoCom members
by exporting through countries not involved in these arrangements.
The idea of a
multilateral export control regime is by far best only optimistic and lacking in realist notions,
especially since the Cold War, economic advantage is more central than military advantage.
Yet, if nations can move beyond their short-term relative gains and look long-term,
engagement in such multilateral initiatives would find to have mutual economic and security
gains.
4.4 China and Hughes Electronics Corporation: National Security Compromised?
It is most appropriate for this paper to identify a current case in international security
discourse that brings together the theoretical issues discussed so far. In 1999, Hughes
Electronics Corporation was attacked for compromising national security for its own
— 54—
economic gain and goal of servicing a greater market share in China. Through an
unauthorized licensing arrangement with China, Hughes transferred civilian satellite
technology and know-how that defense experts and independent agencies argue has
increased China’s missile accuracy in its nuclear weapons program.
This charge has shaken up the efficacy of the U.S. export-control system and
painted a picture of lost autonomy to transnational firms. Declining U.S. economic and
military preponderance in a post-Cold War multi-polar system is seen as costly in a freetrade environment. And new trade theory has implied that the behavior of transnationals in
the trade of “dual-use” goods has created negative externalities in national security.
Before examining the “nuts and bolts” of the Hughes/Chinese transaction, it is greatly
needed to examine why the U.S. views this transaction with China as enhancing its own
“insecurity” with its communist partner.
4.5 Why “Dual-use” Transfers to China are Risky
Before détente, the U.S. viewed China as enemy number one.
This view was
predominant among Washington policy-makers that viewed China as having the willingness
to use conventional (as well as nuclear force) to export its Communist revolution around the
world. Mao Tse-Tung once remarked that “political power comes from the barrel of a gun”
(Jane’s Intelligence Review, p.42). To achieve this aim, the Chinese realized that a
concerted effort would need to be made to improve the quality and inventory of the People’s
Liberation Army (PLA). To do this required to embark on a two-tier modernization program
that combined the development of indigenous technology through the acquisition of foreign
technology from abroad through legal and clandestine means (p. 42). Of its modernization
programs, the nuclear weapons program is the most important.
— 55—
This policy and thinking reflects the risk to U.S security in trading “dual-use” goods
with potential military application with China. Foreign technology acquisition has always
figured prominently in Chinese relations with the industrialized world since the late 1970s.
Allegations today concerning satellite exports and nuclear espionage demonstrate the
centrality of high technology to the debate about China’s place in the world. This makes it
important to policy makers to explore the links that may bind China’s national technology
and industrial policies to security and development. Feigenbaum notes that since 1987,
strategic technology programs has comprised the largest source of direct central
government finance for R&D in priority areas such as space, lasers, and supercomputing (p.
100).
The lion’s share of Chinese technology imports and exchanges are in industries and
fields which can ultimately improve this nuclear power’s military capabilities. Steadily in the
last two decades China has “stepped up” the activity of its imports in electronics, computers,
and aircraft technology. This may simply state that such activity reflects the fact that China
wants technology that is in the broadest term “dual-use” (Frieman, p.1).
The first task before assessing whether or not a “dual-use” good acquired by China
has U.S. security implications, is to determine who receives the good purchased. The record
on the end users of “dual-use” goods in China is rather sketchy. “Chinese trade magazines,
for example report sales of foreign technology to China, yet do not provide the correct name
of the Chinese end user, the dollar amount of the transaction or the exact name of the
supplier” (Frieman, p.4). Information on the sale of certain equipment to China is often too
vague to know whether or not the item could easily be used for military application. Take for
example another controversial export case in 1995 involving the sale of state-of-the-art
machine tool equipment to China that was diverted later to use by a military plant (Hirsch,
p.6). Problematic is that the U.S. Census Bureau keeps record of dollar amounts of
— 56—
equipment sold to China, but not according to product categories that correlate with those
on the Commodity Control lists under export control acts. Disturbing, is that the number of
Chinese companies authorized to engage in international trade has grown dramatically to
such a degree, the national government is finding it difficult to control imports and determine
who the end users of imported equipment are (Frieman, p.7).
The U.S. is not the only supplier of “dual-use” technology to China. The Chinese may
have a preference for U.S. technology, but Chinese importers tend to look to other sources
when delays in export controls are significantly shorter.
According to Frieman’s report, the
Chinese claim, and the U.S. tends to agree, that delays in processing license applications
result in lost sales for U.S. companies because the Chinese can acquire the same
equipment elsewhere (p.6). This claim is apparent in the steadily increasing number of
Chinese market research groups in Chinese import-export companies.
On the U.S. end, Frieman argues that it is difficult to assess whether the sales of
“dual-use” goods as defined by the Commodity Control list increased proportionately to
overall exports between the period 1984-1985 when export controls were loosened. It is
known however, that U.S. sales to China of equipment in selected “dual-use” categories
grew in 1985 by well over the 29 % increase in total exports.
“For example, sales of
computers and office equipment increased 95% to $173.2 million; industrial machinery sales
grew by 145% to $125 million and scientific equipment sales increased by 52% to $249.2
million” (Frieman, p. 9). Furthermore, the level of sophisticated imports by China grew in the
1980s in the area of computers and integrated circuits manufacturing. In hindsight to the
increased amount of sophisticated imports by China from the U.S. and other global
suppliers, more information is needed on the end user to assess any long or short-term
affects from the transfers on China’s economic/military capabilities.
— 57—
Without knowing the end user, export controls to China are warranted. It is difficult to
assess whether or not the products imported for civilian purpose will be used in the
production of military weapons or the improvement of such weapons. For instance lacking
in U.S. trade data is the know-how and inputs transferred to China for the production of
ceramics and metal matrices. According to Frieman’s report, China is dependent on steel
for most heavy manufacturing and has not quite mastered the production of advanced
metals used in advanced weapons and aircraft systems.
However, if the Chinese are
importing these items (i.e. ceramics and other metal matrices) with the intent of devoting the
goods to the military sector, the range of military application is quite broad. Data available
on the composition of Chinese imports does not appear to be directed at any one particular
branch of service of military mission, but can contribute in the long-term to the technological
infrastructure that is required for advanced weapons production.
It is apparent that the goal of China is to restructure its machine building industries in
a way that will increase the country’s capabilities of making both civilian and military
products in a number of factories to further integrate the country’s civilian and military
economies. This parallels the economic argument of market failure. The Chinese have
suggested that their country was burdened by endemic market failure due to the lack of
public investment in R&D (Feigenbaum, p.107). Weapons-only factories in China have only
recently begun to produce products for consumer and industrial customers. This makes it
possible to target the most efficient plants to convert directly to the sole production of
military hardware. This integration of civilian and military economies in China’s economy
makes it more difficult to identify the end user as the composition of China's imports become
more diverse.
— 58—
4.6 A Look at China’s Defense Infrastructure
The above section established the fact that it is difficult to determine which items sold
to China for civilian purposes will be used for military purpose without knowledge of the end
user. According to Frieman, whether or not the availability of “dual-use” goods to China’s
military infrastructure constitutes a risk to U.S. security can only be evaluated by examining
the sophistication of Chinese defense industries.
First, military industries differ from civilian ones in China in that they are under the
auspices of different government industries that are vertically integrated and completely selfreliant. For example, industries under China’s Ministry of Aviation Industry, process metal,
make machine tools, produce electronic components, and assemble aircraft engines and
aircraft. Each industry under the MAI is independent and shares little information between
one another (Frieman, p. 20).
Second, factories under government ministries are self-
contained, producing everything down to the foundry equipment (Frieman, p. 20). A third
difference between military and civilian factories is that military factories appear to have
been protected from some of the supply problems that plague consumer oriented industries
by way of a central government allocation system.
Material from local suppliers in China tends to be unreliable and the quality of the
materials cannot be guaranteed.
It is estimated that factories involved in weapons
production in China tend to receive between 85-95% of the required materials through the
central allocation system. As a result of this central allocation system, Chinese weapons
factories have been given priority for supplies and talented labor. On these grounds, the
central allocation system makes these factories more efficient than consumer ones.
However, vertical integration in the long run makes these industries not as cost-competitive
as consumer industries that are more diversified along supply lines.
— 59—
According to Frieman, evidence exists to support the notion that China’s
conventional weapons factories are considerably worse off than purely civilian industries.
The Chinese reluctantly agree with this notion and it has empowered the commercial
technology elites to shift the locus of weapons decision making much closer to the end user
and reassess the approach to innovation alone through the military sector (Feigenbuam,
p.99). In the past, “foreign visitors to Chinese conventional weapons factories have reported
that production techniques are antiquated, discipline is lax, and quality control is nonexistent” (Frieman, p. 23).
This is because military innovation from the Maoist period was
in the development driver’s seat and resulted in China missing out in sharing in the
technology revolution in Silicon Valley during the 1960s and 1970s (Feigenbaum, p.98).
As well, military industries in China have been extremely isolated from the outside
world, from each other and from the civilian economy. Until recently, political and budget
restrictions have kept many of the defense industries isolated from the rest of the
industrialized world, unlike their civilian counterparts which have been pursuing "open door”
policies aggressively with world markets since 1978 (Frieman, p.23).
Also, the healthy
subsidies provided by the Chinese government to its defense industries, has kept them from
developing an entrepreneurial spirit which results from direct exposure to market forces
(Frieman, p.24).
These subsidies and liberal access to capital markets have greatly
contributed to the country’s public debt problems today. As part of a larger solution it is no
wonder the Chinese government is encouraging horizontal integration.
Although it is possible to generalize about the management and organization of
China’s weapon’s factories, the sharpest contrast in the quality and capabilities of its
weapons is between its strategic and conventional weapons programs. To date, China is
still relying largely on foreign designs from the 1950s for its conventional weapons programs
and because of its antiquated infrastructure and vertical integration of military industries, the
— 60—
Chinese have found it difficult to move to production of a new generation of conventional
weapons systems (Frieman, p.32).
Today, the Chinese are still engaging in cash-for-
weapons transactions with Russia. In February 2000, the Chinese completed a cash-forweapons transaction in a $800 million dollar sale of two Russian built destroyers (Pomfret,
p. A17). Although the technology transferred is some fifteen to twenty years behind the
U.S., China’s strategic program has achieved significant results from its concentration of
talent and capital investment. This program gives pause to the country’s ability to assimilate
foreign technology with the infrastructure it already has.
4.7 China’s Ability to Assimilate Foreign Technology
Given the country’s achievements in its strategic weapons program with the
antiquated infrastructure its defense industry has, the question is whether or not a specific
technology transfer from the trade of a “dual-use” good will result in an improved weapons
system? The outcome of a success particularly depends on the factory and talent involved,
and generalization about this is difficult when the record of the country’s civilian/military
economic integration program is still being played out.
It is known though, that China’s has a considerable historic record in the exploitation
of foreign technology. For instance, China’s entire industrial structure for military production
was established in close consultation with Soviet experts in the 1950s and closely modeled
on the Soviet’s centralized administrative system (Frieman, p.32). The influence of Soviet
design and technology can be considerably seen in Chinese weapons systems today. “In
1984, a study concluded that all of Chinese conventional weapons fit into one of five
categories: Chinese designed weapons which incorporate features of foreign systems,
reverse-engineered systems, modifications of Chinese or foreign prototypes, weapons
licensed to the USSR, and foreign captured systems still in use (Frieman, p.34). Chinese
fighter aircraft submarines, tanks, and armored personnel carriers rely heavily on foreign
— 61—
prototypes. In 1969, PLA ground forces captured a Soviet T-62 medium tank that became
the model for the Chinese T-69 (Frieman, p. 34).
Although the Chinese have been reliant on foreign technology and successful in
assimilating it, the cost has been significantly high.
According to Frieman, reverse-
engineering processes took years before serial production could begin, and when
production did begin it did not enable the Chinese to take advantage of current technological
advances to produce a new generation of weapons systems. While the rest of the world
moves ahead the Chinese have continued to use weapons designs that are 15-20 years old.
From this a generalization based on Li’s argument mentioned earlier in this paper
could be made. Because of management and vertical integration of defense industries in
China, the country’s ability to assimilate foreign technology has not contributed to its overall
technical-production efficiency.
However, if defense industries in China become more
horizontally integrated into the civilian economy, technological assimilation may have a
chance to improve the country’s overall technical production efficiency.
Although this
generalization is hard to make, the historical record does contrast with Krugman’s argument
that less developed countries take advantage of products existent in the market by
producing new products and not old ones.
Three major factors will determine the chances for success of any technology
transfer: the ability to select appropriate technology compatible with current infrastructure,
the availability of complimentary inputs, and the assignment of quality personnel to the
project (Frieman, p. 37). Although China’s portfolio of imports has become more composed
of sophisticated equipment, it is quite doubtful its centralized planning system is capable of
using these imports to meet the above requirements. China has an import plan, but no
absorption plan for the technology. The scientific and technical development plans are
divorced from the import plans and the economic development programs of the country
— 62—
(Frieman, p. 37). Also with the decline of Russian power in the post-Cold War era, China is
without a coherent military strategy
and will make it impossible for its centralized
administrative system to rank objectives and translate them into specific weapons systems
(Frieman, p. 43).
Thus it is reasonable to suspect more attention will be focused on the country’s
strategic weapons program and conventional defensive capabilities Given the country’s
public debt problem, economic efficiency will be compromised as foreign exchange earnings
from exports and capital investments are diverted to military programs. Technical productive
efficiency will decline in hindsight of a military modernization program. As a result U.S.
economic preponderance is not at risk in the near future.
Yet, military modernization does propose a concern to regional interests and U.S.
interests. In assessing the affect of selling “dual-use” high technology items to China for its
military modernization program, the policy-maker must consider two technical issues: (1) In
principle, how might the availability of a “dual-use” item help the Chinese improve military
capability? And, (2) In practice, what technical obstacles are the Chinese likely to encounter
in attempting these improvements?
Until the integration of China’s civilian and military
economies plays out, it will be difficult to assess the impact of a technology transfer on the
country’s military capabilities. The success of the country’s strategic program, which is far
ahead of its conventional program, should give pause. Thus it is imperative in US interest to
assign high priority than it has in the past to the analysis of evolving Chinese capability in
key “dual-use” and military industries. “This will indicate when the Chinese are about to
make the transition from needing ‘everything’ to just needing one or two items that will make
a difference, and will help protect the U.S. from future technological surprises” (Frieman,
p.59).
— 63—
4.8 China and Hughes Electronics Corporation
The aftermath of Hughes Electronics Corporation's transfer of commercial satellite
technology and design information to the Chinese has generated great awareness of the
risks to U.S. national security in the trade of “dual-use” technology. The case presented a
diversity of problems in current U.S. export control policy and licensing arrangements with
foreign nationals. China’s greatest strength is its strategic weapons programs.
Defense experts that the aftermath of Hughes negligence in providing technical and
deign information through their licensing arrangement has the potential to improve China’s
payload capabilities with its medium to long-range rockets. Important to take from this case
is that with the integration of China’s civilian and defense industries and without knowing the
end user of an imported item into the country, the risks from “dual-use” transfers is greatly
increased. Without this information, the impact of a technology transfer may not be known
for years and may leave the U.S. in for a technological surprise. In 1999, a report titled, The
Cox Report, presented its findings from an investigation of the transaction and other risks
that have arisen from commercial transactions with China.
In 1992 and 1995, Hughes Space and Communications International, Inc. attempted
to launch two communications satellites from China on Long March rockets, which exploded
before reaching orbit. Hughes investigated the causes of both of these failed launches and
determined that the rocket's fairings were the cause of the failures. This information was
shared with China Great Wall Industry Corporation, a Chinese government entity in
Xiachang. Allegations then arose regarding technology transfer in connection with failure
analysis investigation conducted by Hughes and presented by the company to CGWC.
“In the course of the investigation, Hughes communicated technical information
regarding the rocket to the PRC that assisted the PRC in improving the Long March 2E
rocket. The activities of Hughes employees in connection with the investigation of the failed
— 64—
launch in 1992 resulted in the transmission to the PRC of technical information that appears
to have been approved by a U.S. Government representative but not properly licensed” (The
Cox Report, chap. 5).
In Hughes’s failure analysis, the technical information that was
shared with CGWIC and approved by an U.S. government representative should not have
been authorized for export to the China.
In both failure analyses of the 1992 and 1995 launches, Hughes shared information
on the Long March 2E fairings that protect the rocket's payload. The information shared
was beyond the scope of the original license issued to Hughes by the Department of
Commerce.
It was found that to export such technical information came under the
authorization of the U.S. State Department. In both failure analyses, Hughes claims that
prior approval was given by U.S. officials to share technical information on the fairings to the
Chinese. However, neither Hughes nor the pertinent U.S. government officials involved
could provide records that could substantiate the claim fully (The Cox Report, chap. 5).
The lessons learned by China from Hughes on the failure of the fairings on both
Long March rockets used in 1992 and 1995 were directly applicable to fairings on other
rockets used to launch Chinese military satellites and payloads carrying strategic weapons.
The Cox Report stated that the information learned by the Chinese on the failure of the
fairings was possibly transferred to the country’s ballistic missile program. It was the opinion
of the report that fairing improvements learned in the failure investigations could be of
benefit to multiple independently-targeted reentry vehicle (MIRV) development (chap. 5). It
was agreed on that the failures of licensing arrangements between U.S. officials and
Hughes has given China the engineering and know-how to conduct future failure analysis
tests on rocket launches to build better fairings that can be used in the country’s ballistic
missile programs.
— 65—
To go into a detailed overview of the licensing arrangements between U.S. officials
and Hughes would be of benefit for a future paper, but is not needed here.
The
investigation by the Select Committee showed that both sides could not provided pertinent
records to support claims of approval and disapproval in the licensing process. What is
known is that the current operation to obtain U.S. licenses to export certain goods, services,
and knowledge has a significant amount of overlap between the Department of Commerce,
Defense, and State Department. The failure is that this overlap does not properly contain
the sharing of information between parties in an arrangement beyond the selling of a good
or service. What is important here is that this paper has provided an argument that U.S.
export controls have been loosened in attempts to recoup lost sales by U.S. firms engaged
in the production of high-technology goods.
As a result, in the trade of “dual-use” technology the risk of a trading partner
acquiring information or a byproduct of a technology input is a risk to U.S. security when it is
used in the modernization of that trading partners weapons program.
In the
Hughes/Chinese transaction what the Chinese gained was improvement in fairing designs
that could be used to improve the payload protection in the country’s ballistic missile and
military satellite program. As well, the Chinese also gained know-how in the conduction of
anomaly analysis to target failures and assist in the improvement of rocket launches. Such
a knowledge transfer may if not already has been diverted to the country’s MIRV
development program. The threat to regional and U.S. interests is more reliability in the
payload systems in China’s ballistic missiles, as well as the potential to increase missile
accuracy from improved anomaly tests.
— 66—
CONCLUSION: Containing Tech Transfers with out Compromising Economic
Security
U.S. and other nation-states are paying the price in compromised security today due
to pressures from globalization. The race for market share in China is one such example.
In today’s news we are hearing about Chinese espionage in U.S. nuclear and related
defense industries. The success of this espionage has been the use of “dummy” or “front”
firms by China for the purchase of technological inputs such as super computers and
oscillators critical in nuclear weapons development programs.
On May 25, 1999, CNN
reported that the compromise in U.S. export controls has give China the economic and
military capability to produce within three to four years intercontinental nuclear warheads
that could accurately reach the continental U.S.
Evident from this is a need to overhaul the current export control system. Today’s
system is under the auspices of the Department of Commerce, whose interest is to promote
U.S. exports and U.S. business abroad. The goals of the DOC automatically create an
imbalance between economics and security. Prior to the DOC’s control of the export control
system, the system was in the hands of the Department State. After the Cold War, the
reigns of control were handed over.
The international environment at the time was an emerging European Union, the
technological preponderance in the new industrial economies of Southeast Asia, and the
economic collapse of the Soviet Union. With these factors and others, the U.S. changed
from a Cold War regulator to a “competitive” nation-state. Controls on “dual-use” goods
(which at the time had no present military applications) were loosened, and transnational
firms took advantage of these loopholes to export these products in order to “shore” any loss
in technological leadership. Along with this, the rise of trading blocs eroded previous control
systems giving transnationals the ability to divert international transactions in “dual-use”
goods unchecked across multiple borders in customs unions. Beyond transactions are the
— 67—
sharing of know-how between firms and their host economies. How to overhaul the current
export control system can be a whole new paper in itself. Critical to the overhaul is the
enforcement required to monitor the behavior of transnational corporations. The dilemma is
between unilateral and multilateral action that would not have economic costs of export
controls rise above those of economic security. It is a fact that the behavior of transnational
firms in international trade is just as difficult as monitoring the transactions in intra-firm trade
of “gray” area goods.
What needs more careful scrutiny is licensing, acquisitions by foreign firms, and joint
ventures between firms. It is in this arena that a greater degree of technology diffusion
takes place. It is possible, but alone only idealistic, that a strong WTO formulate codes that
nations must abide by when transferring “dual-use” goods to help create collective economic
security. This may be much preferred by nation-states in which safeguarding autonomy is
paramount, rather than entering arrangements with other countries in which free trade
maybe compromised. Under these arrangements countries would have more control over
market access and direct investment that would impede free trade and the operations of
transnationals.
The nation-state today is at a crossroad. The dilemma is when to interfere in the
behavior of transnationals as well as managing trade more without creating friction in
today’s free trade environment. In the past the nation-state was the acting sovereign and
controlled the flow of goods over its territories.
Today trading blocs of countries have
eroded this sovereignty, so this may be where the nation-state can begin. Export control
systems within trading blocs such as the EU, NAFTA, and ASEAN may be more affective
rather than one contrived by the WTO. Territory is still safeguarded and the trading bloc can
be the acting “container” allowing nation-states to continue to act “competitive”.
— 68—
Could this help strike a balance between economics and security. It all depends and
we will have to wait and see. The obvious challenge first is to act unilaterally to overhaul the
current export control system and list of “dual-use” goods that have alternative uses before
the state can act multilaterally.
The members of the European Union are facing this
challenge now as it seeks to broaden the Union to bring in the nation-states of Eastern
Europe.
The months ahead will tell us how the U.S. will respond officially to China’s alleged
espionage activities in U.S. industries.
The actions taken by the U.S. will have
repercussions on the free trade environment as well as it trading partners. The sensitive
issue is of course how the major players, transnational firms will respond. The retrenchment
of the nation-state may increase hostilities with the transnational firm, which has the luxury
to relocate to economies, like China.
What should be decided is whether or not China really matters economically. A
policy that engages China as a second-rate power economically would have an impact on
the thinking of transnationals seeking to do business there. Whatever the spin, the argument
has been debated to death that one can not miss out on China’s market. The numbers say
otherwise though. In 1997, China contributed less than 3.5 percent to world GNP (Segal,
p.25). As well, China’s GNP for the same year ranked seventh in world behind Brazil and
Italy. More depressing is that its per capita GNP ranking was 81st, ahead of Georgia and
Papua New Guinea (p.25).
By conservative estimates, the country’s loans are non-
performing and its banking system is losing money. In terms of international trade and
investment, the story if much the same. In 1997 and 1998, China contributed a mere 3% to
total world trade which is less than the Netherlands. By taking these few qualifications into
account, China’s economy is in a recession. It doesn’t take a statistical genius to see that
China is a minor player, with a contracting economy that transnational should think twice of
— 69—
“getting in bed with”. Even Ericsson, a Swedish telecommunications company, says it has
yet to make any profits in China yet (p.28).
A U.S. policy that treats China as a second rate power economically, politically, and
militarily, would do good in influencing the balance-of-power between nation-states and
transnational more in favor of the nation-state. Until the illusion of China is “cut down to
size”, tougher regulation and monitoring of transnational’s behavior in trade and technology
transfers need to be done.
— 70—
— 71—
REFERENCES
Bertsch, G. and McIntyre, J. (Eds.). 1983. National Security and Technology Transfer: The
Strategic Dimension of East-West Trade. Colorado: Westview Press, Inc.
Burton, D. and Inman, B. “Technology and Competitiveness: The New Policy Frontier”.
Foreign Affairs, Spring 1990 (Vol. 69, No. 2, pp.117-134).
Central Intelligence Agency. 1982. “Soviet Acquisition of Western Technology”. In: Bertsch,
G. and McIntyre, J. (Eds.), National Security and Technology Transfer: The Strategic
Dimension of East-West Trade. Colorado: Westview Press, Inc. pp.92-112.
“China Equips Itself for Power Projection”. Jane’s Intelligence Review. February 2000
(Volume 12, No. 2, p.42-46).
Cooper, J. 1985. “Western Technology and Soviet Economic Power”. In: Schaffer, M.
(Ed.), Technology Transfer and East-West Relations. New York: St. Martin’s Press. pp. 80110.
Dicken, P. 1998. Global Shift, Third Edition. New York: Guilford
Feigenbaum, E. 1999. “Who’s Behind China’s High-Technology ‘Revolution’? How Bomb
Makers Remade Beijing’s Priorities, Policies, and Institutions”. International Security.
Summer 1999 (Vol. 24, No. 1, pp.95-126).
Frieman, W. 1986. “National Security Risks of Dual-use Transfers to China”. Science
Applications International Corporation: Washington, D.C. pp.1-59
Gilpin, R. 1977. “Economic Interdependence and National Security in Historical
Perspective”. In: Knorr, K., Trager, F. (Eds.), Economic Issues and National Security. New
York: New York University Press. pp.19-66.
Gilpin, R. 1987. The Political Economy of International Relations. New Jersey: Princeton
University Press.
Golden, J. 1994. Economics and National Strategy in the Information Age: Global
Networks, Technology Policy, and Cooperative Competition. Westport: Praeger.
Goodwin, C. 1991. Economics and National Security: A History of Their Interaction.
Durham: Duke University Press.
— 72—
Gunnemann, J. 1975. The Nation-State and Transnational Corporations in Conflict. New
York: Praeger.
Heinz, J. 1991. U.S. Strategic Trade: An Export Control System for the 1990. Boulder:
Westview Press.
Hirsch, M. 1998. “The Great Technology Giveaway?” Foreign Affairs. September/October
1998 (Volume 77, No.5, pp. 2-6).
Holloway, D. 1985. “Western Technology and Soviet Military Power”. In: Schaffer, M. (Ed.),
Technology Transfer and East-West Relations. New York: St. Martin’s Press. pp. 170-185.
Jordan, A. and Taylor W. 1999. American National Security. Baltimore: Johns Hopkins
University Press.
Kapstein, E. 1992. The Political Economy of National Security. South Carolina: University of
South Carolina Press.
Kemme, D. 1991. Technology Markets and Export Controls in the 1990s. New York: New
York University Press.
Knorr, K. 1977. “Military Strength: Economic and Non-Economic Bases”. In: Knorr, K.,
Trager, F. (Eds.), Economic Issues and National Security. New York: New York University
Press. pp. 183-199.
Krugman, P. 1990. Rethinking International Trade. Cambridge: MIT Press.
Krugman, P. 1991. “New Thinking About Trade Policy”. In: Morse, R., Prestowitz, C.,
Tonelson, A. (Eds.), Powernomics: Economics and Strategy After the Cold War. Maryland:
Madison Books. pp. 74-81.
Li, C. and Mirmirani, S. “Global Transfer of Arms Technology and Its Impact On Economic
Growth”. Contemporary Economic Policy, October 1998 (Vol. 26, pp. 486-497).
Markusen, A. 1999. “The Rise of World Weapons”. Foreign Affairs. Spring 1999 (Number
114, pp.40-51).
Mastanduno, M. “Do Relative Gains Matter?: America’s Response to Japanese Industrial
Policy”. International Security, Summer 1991 (Vol. 16, No.1, pp. 73-113).
— 73—
Molas-Gallart, J. “Which Way to Go? Defence Technology and the Diversity of ‘Dual-Use’
Technology Transfer”. Research Policy, October 1997 (Vol. 26, No. 3, pp.367-385).
Moran, T. “International Economics and National Security”. Foreign Affairs, Winter 1990/91
(Vol., No. , pp. 75-90).
Melzter R. 1977. “Contemporary Security Dimensions of International Trade Relations”. In:
Knorr, K., Trager F. (Eds.), Economic Issues and National Security. New York: New York
University Press. pp.200-230.
National Academy of Science. 1987. Balancing the National Interest: U.S. National
Security Export Controls and Global Economic Competition. Washington D.C.; National
Academy Press.
Patel, P. and Vega, M. “Patterns of Internationalization of Corporate Technology: Location
vs. Home Country Advantages”. Research Policy, March 1999 (Vol. 28, Nos. 2-3, pp. 145155).
Pomfret, John. 2000. “Russians Help China Modernize its Arsenal”. Washington Post.
February 10, 2000. P.A17. www.washingtonpost.com.
Schlessinger, James R. 1960. The Political Economy of National Security: A Study of the
Economic Aspects of the Contemporary Power Struggle. New York: Praeger.
Segal, G. 1999. “Does China Matter?” . Foreign Affairs. September/October (1999, p.2436).
Vernon, R. 1972. The Economic and Political Consequences of Multinational Enterprise: An
Anthology. Boston: Division of Research, Graduate School of Business Administration,
Harvard University.
U.S. House Of Representatives. 1999. U.S. National Security and Military Commercial
Concerns with the People’s Republic of China (a.k.a. The Cox Report).
[http://hillsource.house.gov/Cox Report/report].
Wolf, T. 1983. “The Distribution of Economic Costs and Benefits in U.S.-Soviet Trade”. In:
Bertsch, G. and McIntyre, J. (Eds.), National Security and Technology Transfer: The
Strategic Dimensions of East-West Trade. Colorado: Westview Press, Inc. pp.29-47.
— 74—